Master-slave adapter

ABSTRACT

A system and method are provided in which communication adapters, which are used for the transfer of message packets from and amongst a plurality of data processing nodes, are provided with internal storage which is used to indicate the status of a particular adapter as a master, as a slave or as a backup up adapter. This information provides the adapters with the ability to be called into service to take over the operations of another adapter in the event of node or adapter failure.

BACKGROUND OF THE INVENTION

The present invention is generally directed to systems and methods fortransferring messages from one autonomous data processing unit (node) toanother such unit across a network. More particularly, the presentinvention is directed to systems and methods for message transfer in anefficient and reliable fashion without the need for the creation ofextraneous message copies through a switched network in a manner thateffectively handles bad paths and problems associated with messagepacket ordering and synchronization. Even more particularly, the presentinvention is directed to a communications adapter that is providedbetween an autonomous data processing unit and a switched network. Evenmore particularly, in accordance with another aspect of the presentinvention, a system and method are provided in which various hardwaretasks associated with a specific channel are provided with a mechanismfor communicating with one another in a direct memory to memory fashion.In yet another aspect of the present invention, the communicationadapters are provided with mechanisms for time of day synchronizationand with related mechanisms that establish backup and master/slaverelationships amongst a plurality of adapters that permit designatedbackup adapter units to take over the communications operations of afailed adapter unit.

It is first of all desirable to place the present invention in itsproper context and to indicate that it is not directed to the transferof information within a single data processing unit. This can be likenedto talking to someone in the same room. Instead the present invention isdirected to the transfer of information in the form of messages ormessage packets through a switched network having a plurality ofpossible information flow paths. This can be likened to a lengthyconversation between individuals on different continents.

When information is transmitted through a switched network in the formof message packets there are many problems that can arise. First of all,it is possible that one of many message packets fails to arrive. Or, ifit does arrive, an “acknowledgment of receipt” message may not make itsway back to the sender, which points out the fact that thiscommunication modality is such that a return signal acknowledgingreceipt is a very desirable part of the message passing protocol.Secondly, even if the message packet does arrive, it may not arrive in adesired sequence with respect to other related packets. Thirdly, thereare typically many paths that a message packet may take through aswitched network. The reliability of these paths is subject to changeover time. Accordingly, systems for message packet transfer should takebad paths into account by identifying and tracking them as they arise.

One of the very desirable attributes of a message passing system is tohave various hardware tasks associated with a specific channel tocommunicate with each other. However, one of the specific problems thatcan occur in message passing systems such as those employingcommunication adapters occurs when there are several tasks associatedwith a specific channel, and one of these tasks is copying a key controlblock from external memory into some local memory. In this circumstance,the other tasks need to be told to wait for this control block to get tothe local memory.

One of the ways for solving this problem is via the creation of asemaphore for every potential action for every channel that is supportedby the adapter. When a task wants to perform this action for a specificchannel, it locks this semaphore, blocking all other tasks from-performing this action to this channel. When the action has completed,the task can then leave a specific indicator (an “encode”) in thesemaphore, indicating to all other interested tasks that this particularaction has completed. There are, however, several problems with thisapproach. For example, an adapter support thousands of channels or anadapter may have a large number of actions that it wants to perform onthat channel (such as copying in a key control block into local memory).In this regard it is noted that locking and unlocking semaphores isusually a slow process because of the communication coordination andoverhead required.

SUMMARY OF THE INVENTION

In accordance with one aspect of the present invention, there isprovided a specialized hardware register, the “channel state register”(CH_STATE), which is a register that is associated with a specificchannel and is only accessed by a task associated with that specificchannel. Any value placed in the CH_STATE register is immediately seenonly by the other hardware tasks associated with the same channel. Notethat this hardware register is different from a “general purposeregister” (GP register), because only those tasks that associated with aspecific channel access the CH_STATE register for that channel. It isalso different from a “task register” (TR register), which can only beaccessed by the task associated with it. One of the key aspects of thepresent invention is that we are moving the communication between onetask and another task into a specialized register, which is directlyaccessible by the associated tasks. This register is much “closer” tothe processing unit than local or external memory, and hence much fasteras a means of communication.)

In accordance with another aspect of the present invention communicationparameters are first established which link message packet headerinformation with desired memory locations at both ends of thecommunication path. The communications adapter of the present inventionare provided with processing engines which are capable of accepting andacting on these parameters using commands received from the dataprocessing nodes in a loosely coupled network.

In accordance with another aspect of the present invention thecommunication adapter is provided with specific hardware for processingscript commands for the rapid formatting of message packet headerinformation.

In accordance with another aspect of the present invention thecommunication adapter is provided with command processing capabilitieswhich render it possible to transmit, in a single packet, in directmemory to memory fashion, information contained within disjoint(non-contiguous) regions of source memory. This is done through the useof a preload operation.

In accordance with another aspect of the present invention thecommunication adapter is provided with the ability to accept commands inwhich the desired message packet is broadcast, not to a single adapterconnected to a receiving node, but to which is instead broadcast to allof the nodes in the network. Special codes used in the transferoperation are used to indicate that all of the adapters are intended asrecipients of the message packet. Additionally, the presence of userkeys also renders the system capable of operation in a multicast fashionas well as the originally intended broadcast mode.

In accordance with another aspect of the present invention thecommunication adapter the commands, data, message packets, parametersand instructions received by the adapter are processed by the adapterusing a programmable instruction processor capable of recognizingcommands and data for transfer of information within the message packetsdirectly to memory locations within a targeted node.

In accordance with another aspect of the present invention thecommunication adapters are provided with mechanisms for the receipt oftime of day information. It is this information which is important forcomparing time stamp information to determine packet age. The adaptersperiodically receive time of day information from a master node/masteradapter and determine if any broadcasts have been missed. If too manyare missed, drift corrections are requested. In this way adaptersynchronization is significantly improved.

In accordance with another aspect of the present invention thecommunication adapters are provided with internal data storageindications reflecting the status of the individual adapter as beingeither a master or slave adapter. In addition these indications alsoreflect the status of the individual adapters as being backup adapterswhich are capable of taking over the processing of message packettransfer.

In accordance with another aspect of the present invention thecommunication adapters are provided with internal memory which can beinterrogated for the purpose of extracting relatively detailedindications of problems and errors that occur in packet transmission. Inthis way specific problems can be identified and solved, so as toincrease reliability, availability and serviceability of the adapterunit.

Accordingly, it is an object of the present invention to provide amechanism for the direct transfer of information from memory locationsin one node to memory locations in another node.

It is also an object of the present to provide a communications adapterwhich is capable of taking over adapter operations of failed units.

It is also an object of the present to provide a communications adapterwhich is capable of time of day synchronization operations and which isbetter able to correct for temporal drift.

It is also an object of the present to provide a communications adapterwhich is capable of receiving and processing a wide range of commandsand/or instructions (these terms being used synonymously) to effectuatea plurality of different message packet transfer modalities.

It is also an object of the present to provide a communications adapterwhich is capable of recognizing a wide range of error conditions andproviding an interrogatable internal storage area which specificallydelineates a large number of error conditions, thus reducing to aminimum the number of fatal errors or errors that result in a connectionfailure.

Lastly, but not limited hereto, it is an object of the present inventionto improve the speed, efficiency and reliability of message packettransfer in a data processing network.

The recitation herein of a list of desirable objects which are met byvarious embodiments of the present invention is not meant to imply orsuggest that any or all of these objects are present as essentialfeatures, either individually or collectively, in the most generalembodiment of the present invention or in any of its more specificembodiments.

DESCRIPTION OF THE DRAWINGS

The subject matter which is regarded as the invention is particularlypointed out and distinctly claimed in the concluding portion of thespecification. The invention, however, both as to organization andmethod of practice, together with the further objects and advantagesthereof, may best be understood by reference to the followingdescription taken in connection with the accompanying drawing in which:

FIG. 1 is a block diagram illustrating the general environment in whichvarious aspects of the inventions herein are employed;

FIG. 2 is a block diagram illustrating the fact that the inventionsdescribed herein may be employed in a data processing server which isconnected to a plurality of separate networks;

FIG. 3 is a block diagram illustrating the position and role ofcommunication adapters in the transfer of messages between and amongstdata processing nodes;

FIG. 4 is a block diagram illustrating the role of descriptor lists onthe sending and receiving sides of a message packet transfer;

FIG. 5 is a block diagram similar to FIG. 4 but more particularlyillustrating remote read-write operations;

FIG. 6 is a block diagram illustrating the use of communication adaptersin smaller network configurations;

FIG. 7 is a block diagram illustrating the use of communication adaptersin larger network configurations;

FIG. 8 is a block diagram illustrating the structure of the desiredprogram interface that is employed to effectuate message passingprotocols;

FIG. 9 is a block diagram illustrating the process of addresstranslation that occurs in message packet transfers and relatedoperations;

FIG. 10 is a block diagram illustrating the address translation processfor pages having a first size;

FIG. 11 is a block diagram illustrating the address translation processfor pages having a second, larger size;

FIG. 12 is a block diagram illustrating the process of adapter targetidentification;

FIG. 13 is a block diagram illustrating the process that occurs duringbroadcast operations in which a message packet is delivered directly tothe memories of a plurality of targeted nodes;

FIG. 14 is a block diagram illustrating channel interrupt generation;

FIG. 15 is a block diagram illustrating the layout of defined addressfields;

FIG. 16 is a state diagram illustrating changes in state that occur incommunication adapters of the present invention;

FIG. 17 is a diagram illustrating the layout, content and sizes of datafields employed in the Local Mapping Table which contains many of thecommunication parameters used to effect the direct memory to memorymessage packet transfer herein;

FIG. 18 is a map illustrating the layout, content and size ofTransaction Control Element (TCE) parameters used herein;

FIG. 19 is a map illustrating the layout, content and size of parametersused in remote write operations;

FIG. 20 is a map illustrating the layout, content and size of parametersused in remote read operations;

FIG. 21 is a map illustrating the layout, content and size of parametersused in source of push operations;

FIG. 22 is a map illustrating the layout, content and size of parametersused in target of push operations;

FIG. 23 is a map illustrating the layout, content and size of parametersused in source of pull operations;

FIG. 24 is a map illustrating the layout, content and size of parametersused in target of pull operations;

FIG. 25 is a map illustrating the layout, content and size of parametersused in preloading operations;

FIG. 26 is a map illustrating the layout, content and size of parametersused in branching operations;

FIG. 27 is a map illustrating the layout, content and size of parametersin the path table entry;

FIG. 28 is a map illustrating the layout, content and size of parametersin the route table entry;

FIG. 29 is a map illustrating the layout, content and size of parametersin the broadcast registers;

FIG. 30 is a map illustrating the layout, content and size of parametersin the sequence table entry;

FIG. 31 is a block diagram illustrating the steps that occur in anunreliable push operation;

FIG. 32 is a block diagram illustrating the steps that occur in areliable delivery push operation;

FIG. 33 is a block diagram illustrating the steps that occur in areliable acceptance push operation;

FIG. 34 is a block diagram illustrating the steps that occur in areliable delivery pull operation;

FIG. 35 is a block diagram illustrating the steps that occur in areliable acceptance pull operation;

FIG. 36 is a block diagram illustrating the steps that occur in a remotewrite operation;

FIG. 37 is a block diagram illustrating the steps that occur in a remoteread operation;

FIG. 38 is a block diagram illustrating the components of an adapterdesigned to carry out the message passing operations described herein;

FIG. 39 is a block diagram illustrating a configuration of servers andadapters employed in a data processing system;

FIG. 40 is a block diagram illustrating the role and function of theLink Driver Chip;

FIG. 41 is a block diagram illustrating the components employed in adifferent, earlier, less sophisticated communications adapter;

FIG. 42 is a flow chart illustrating the operations performed bymicrocode controlled portions of the communications adapters of thepresent invention;

FIG. 43 is a set of state diagrams illustrating state transitions thatoccur during the automatic tracking of bad communication paths;

FIG. 44 is block diagram of a packet heading formatter employed withinthe communications adapters of the present invention;

FIG. 45 is a block diagram illustrating interactions between and amongvarious components of communications adapters of the present invention;

FIG. 46 is a block diagram illustrating relations and interactionsemployed between and among lists, tables and parameters employed toeffectuate the zero copy transfer of the present invention;

FIG. 47 is a block diagram illustrating interactions between and amongvarious components of communications adapters of the present inventionfrom a different perspective than that shown in FIG. 45;

FIG. 48 is a flow chart illustrating the handling of data present on theScan COMmunication ring (SCOM ring) used to link various portions of thecommunications adapter and for external communication to a serviceprocessor as well;

FIG. 49 is a block diagram of the SCOM ring referred to in thedescription above for FIG. 48; and

FIG. 50 is a block diagram of the IPC (InterPartition Communicationfacility) Protocol Engine (IPE).

DETAILED DESCRIPTION OF THE INVENTION

The message passing function of the present invention provides a lowlatency, high bandwidth, reliable, scalable server interconnections fora cluster environment using message passing type software protocols.Message passing is used to exchange simple control information betweentasks operating in different servers or to efficiently transfer largeamounts of data used by parallel processing jobs. Each server includesone or more independent communication adapters for performing messagepassing. Each adapter allows blocks of memory to be moved betweendifferent servers under software control. Software defines the type ofcommunication desired by creating a table in memory of hardwarecommands, called a descriptor list, and then tells the hardware to dothe actual data movement while the software is working on otheractivity. Each adapter provides a number logical channels each of whichhas its own descriptor list operating independently from other channels.The hardware multiplexes activity among all active channels giving theperspective that it is simultaneously shared by many independent tasks.

The architecture of the present invention contemplates systems withhundreds of server nodes, each with a plurality of communicationadapters connected to one or more switched networks. Each of theadapters includes hundreds or thousands of separate channels. In thecontext of the present description, the term “channel” includes“subchannels” as they occur in some large server systems such as inadapters used in the zSeries of data processing products (asmanufactured and sold by the assignee of the present invention), and theterm also includes a “window” in a pSeries data processing product (alsomanufactured and sold by the assignee of the present invention) whichalso includes communication adapters; additionally, the term “channel”also includes connections for an adapter that works with TCP/IP, or itcould be a “Q-pair” for Infiniband adapters, and it also includes, moregenerically, any logical entity that represents a communication paththat is independent from other similar communication paths definedbetween or associated with similar entities.

Because of the desire for increased performance, the adapter of thepresent invention physically interfaces to the server as close to theserver's memory component as possible but does not have access to eitherthe processor address translation logic or any I/O (Input/Output) busaddress translation logic. The architecture of the adapter portion,therefore, includes an address translation component capable ofconverting effective memory addresses within a channel address spaceinto real memory address values. This translation is used whenever thehardware needs to access descriptor lists or data areas in memory.

The Message Passing hardware of the present invention provides bothsend-receive and remote read/write type transfer models.

The send-receive model uses software on the sending side to describe alocal memory region where hardware obtains source data. Software on thereceiving side describes a memory region local to it where hardwareplaces the data obtained from the source side. Neither side knowsanything about the other side's memory other than how many bytes are tobe copied. Either side can initiate the actual transfer after the twosides have defined their respective memory buffers. A push operation isinitiated by the side providing the data. A pull operation is initiatedby the side receiving the data.

In the send-receive model employed herein each side involved in thetransfer has a channel and at least one descriptor defined. Thetransmission can be viewed as sending a serial stream of bytes frommemory on one server to memory on another server. Sending side softwaredefines in a descriptor list where in memory the data is obtained. Itmay be entirely within a single consecutive block of virtual memorylocations or it may be scattered in arbitrary sized pieces throughoutmany locations. Likewise, receiving side software establishes adescriptor list which identifies where in its local memory the data isplaced. Likewise, the location may be a single memory block or the datamay be scattered throughout the target server. There are no restrictionson memory addresses or transfer sizes. In the most recent embodiment ofthe present invention there is a current upper limit of 64 terabytes perindividual descriptor. There are also cases where the sending andreceiving sides have not fully communicated with each other about theexact number of bytes to be transferred. The architecture of the presentinvention supports a block marking function to handle these cases. Thesending side marks the last byte of its transmission, thus signaling tothe receiving side that it should start processing the data even thoughthere may be space at the receiving end for more data. Similarly, thereceive side may indicate that it can't handle all of the data beingsent. In this situation, the receiving side discards any excess data andtells the sending side about the situation. See FIG. 4.

The channel providing data includes one or more source of push or sourceof pull type descriptors identifying the data to be sent depending ofwhether the transfer occurs as a push or pull. The channel receiving thedata includes one or more target of push or target of pull typedescriptors identifying where to place the data. The details associatedwith these descriptors are provided elsewhere herein below. Either sidecan request a processor interrupt following the transfer or after keyparts of the transfer are complete.

The send side and receive side channels associated with push operationsdo not need to be tied to a single connection. They can simultaneouslybe used for transfers to or from multiple servers; Each element on thesend side descriptor list identifies the target for that descriptorelement. The list collectively transmits data to any target authorizedby the operating system. The receive side channel can, with restrictionsas discussed below, also be used as the target from multiple senders.The restrictions recognize that packets can be seen at the receiverintermixed from different sources.

The remote read/write model defines a master side and a slave siderather than a send and a receive side. The master has more authority andresponsibility than the slave or either side in the send-receive model.The slave defines a region of memory that can be accessed externally,but is not involved in the actual transfer. Software in the master thendirectly accesses random locations within this region without furtherassistance of software on the slave side. In the remote read/writemodel, each side defines a channel supporting the operation. The masterside builds a descriptor list identifying both the local and remotememory regions involved in the transfer plus an identification of theslave adapter and channel. That list includes one or more remote read orremote write type descriptors as further described below. The channel onthe slave side does not use descriptors during remote read/writeoperations. In remote read/write operations, the channels used in boththe master side and slave side are dedicated to the operation. Unlikepush operations, the channels are not simultaneously involved withmultiple independent transfers.

A network “fabric” as that term is employed herein typically includesanywhere from a few servers to thousands of servers. The fabric includesadapters within each server, copper cables connecting the adapters toswitches, and board wiring, copper cables or fiber cables connectingswitches together. The details of how the individual components areconnected is not relevant to either the practice or understanding of thepresent invention nor to the software perspective of a message passingsystem, but it is nonetheless useful to have an appreciation of thebasic structure and the range of its complexity. Smaller systems areconfigured such that every adapter communicates with every other adapterusing a single fully interconnected network. Larger systems, where thecost of full interconnection becomes very high, are constructed usingseveral independent networks. The illustration shown in FIG. 2 depicts asystem with two independent networks. Server A (also referred to as CECA, or Central Electronic Complex A) includes two message passingadapters (200D and 200Z) each connected to different independentnetworks. In systems contemplated for used with the present invention,each network includes up to 4,095 adapters with up to 64K adapters inthe system. Each adapter may have multiple connections to the network toimprove RAS (Reliability, Availability and Serviceability). Each adaptermay be part of only one network. It may communicate to any adapter onthat network but not to any adapter in another network. A server mayinclude adapters associated with multiple networks. Every adapter on asingle network is assigned a logical ID value from 0 to 4,094 (The exactnumber is not critical for the practice of the present invention in itsmost general embodiment). Every adapter in the system is assigned aunique physical ID value from 0 to 65,535. Software uses the logical IDvalues to identify two adapters on the same network involved in a datatransfer. Hardware uses the physical ID value to verify that messagesare delivered to the intended destination in spite of hardware failuresor miswired cables.

In one preferred embodiment of the present invention, each serverincludes one or more adapter pairs. The adapter pair share two externallinks and are connected together with a link contained within theserver. See FIGS. 6, 7, 13, 34 and 35. Both adapters are connected tothe same network. Each network includes up to 1,024 adapters or 512adapter pairs. Multiple networks allow use of more than 1,024 adapters.Small networks with 16 or fewer adapters are built with one plane and asingle switch board. Larger networks are built with two independentswitch planes, each using from 1 to 48 switch boards. Adapter pairs usethe internal link to connect the two planes together extending theinterconnection to 1,024 endpoints. A software convention is used wherethe physical ID value associated with an adapter is constructed byconcatenating a four bit number identifying the network used by theadapter with the adapter's twelve bit logical ID value.

Programming Interface

This section describes the message passing hardware from a programmingperspective. It describes the overall structure, functions providedalong with detailed descriptions of the individual commands and varioustables required to use the function.

All message passing operations reference a local channel within thelocal server and a remote channel usually within some other server. Theremote channel may also be in another adapter within the same server orwithin another channel within the same adapter. A channel can be thoughtof as a hardware conduit to other servers that has been allocated to aspecific software task. Before software uses the message passingfunction it obtains a channel from the operating system. This allows theoperating system to establish various tables granting the user authorityto access the hardware and limiting the hardware's ability to referencememory, remote servers, and remote channels when processing thatchannel. Once a channel is created, user level software can use thechannel for internode communications without necessarily needing furtheroperating system involvement. A user's perspective of a channel is thatit establishes a memory region that both it and the message passinghardware can access. That region contains data buffers that can beexchanged with tasks running in other servers and a list of descriptorswhere the user defines exactly what type of operation is required. Whenthe operating system allocates a channel it performs the followingtasks:

-   -   1. Chooses an available channel among those supported by the        hardware. The number of channels provided is implementation        dependent. That channel has associated with it a channel number,        an MMIO (Memory Mapped I/O) address range within the node's real        address space, a server number within the system, and an adapter        number within that server;    -   2. Determines the logical ID value associated with the selected        adapter. This value is used in descriptors to identify a remote        message passing adapter;    -   3. Gives user level software access to the selected channel by        creating a page table entry that is used by the node's address        translation mechanism. Each channel is associated with a fixed        4K page within the node's real address space. User level        software controls its message passing activity for the channel        by issuing MMIO type store commands to selected addresses within        a 128 byte block of this page. The effective address of this        block is defined by the operating system and referred to as a        channel ID. The channel ID is viewed as an abstraction of the        adapter identification and channel number. The operating system        may choose any page within the user's address space. The        translated real address value is, however, consistent with the        format expected by the hardware. A successful address        translation during a MMIO store operation means that the user is        allowed to access the channel. The real address value resulting        from the translation specifies:        -   that the operation is associated with a user message passing            command;        -   identifies the adapter within the local server that            processes the command;        -   identifies the channel number within that adapter; and        -   identifies the type of action desired;    -   4. Registers the user's memory region that's to be associated        with this channel. This region holds data buffers exchanged with        other servers and descriptors controlling the transfers. This        step involves pinning the pages within the region and setting up        the message passing address translation table that the hardware        uses to convert user supplied buffer offset values placed in        descriptors into real address values; and    -   5. Initializes the channel's Local mapping table (LMT) entry in        the selected adapter. This LMT entry holds the privileged        information established by the operating system for that channel        plus the status of any message passing activity as determined by        the hardware. The operating system identifies in the LMT the        memory region associated with the channel along with pointers to        the translation table and the start of the descriptor list. It        also tells the hardware what kind of operations are allowed,        sets user keys limiting the scope of message passing transfers,        and defines the type of processor interrupts available to the        channel. The LMT is discussed in more detail elsewhere herein.    -   5. Presents to user software:        -   1. the channel ID value that is used with all user message            passing commands;        -   2. the local logical ID value that identifies the adapter            within the local descriptors; and

3. the user's effective address for the descriptor list. TABLE 1 channelIdentifies the LMT array entry in the selected adapter that numbercontains information about this channel. The value is given to usersoftware when a channel is created. user The real address rangeassociated with user level command commands. Fields within the addressvalue identify the space channel and type of hardware action desired.This value is not directly given to user software. User software isinstead given a virtual address that the hardware translates into thisrange. server Identifies the server within the entire system thatincludes number the Message Passing adapter associated with thischannel. This value is not directly given to user software. It is used,along with the adapter number to generate a ‘physical ID’ valueassociated with the local adapter. adapter Identifies the adapter withinthe selected server that number controls this channel. This value is notdirectly given to user software. It is used to construct a page tableentry associated with user commands. It is also used to constructlogical and physical ID values associated with the local adapter.

An application may use several channels. Each channel has a uniquechannel id value and channel number. An application uses the channel idvalue to reference it's own channel and uses a channel number, pluslogical ID value, to refer to channel's in other servers.

In message passing transfers software defines a list of one or moredescriptors in memory that tell the hardware what to do. It defines thetype of transfer, direction of transfer, memory address of a localmemory buffer, and size of the buffer. If this software is initiatingthe transfer it also supplies a remote channel/logical ID combinationidentifying the target of the transfer. The physical path that thetransfer takes from the local hardware through the network to the targetis identified by a path table and route table established by the serviceprocessor when the hardware is initialized. The logical ID value whichsoftware places in the descriptor identifies up to four entries in thisroute table that define alternate paths to the target plus an entry inthe path table that indicates which one of these possible routes shouldactually be used.

Protection Mechanisms

The present invention provides protection by guarding againstmisbehaving or malicious software. It provides four levels of authorityin order of “most trusted” to “no trust at all”:

-   -   1. service processor;    -   2. hypervisor;    -   3. privileged operating system, kernel, or kernel extensions;        and    -   4. problem state user code        Service processor software has total control over the hardware.        There is no mechanism for protecting against its behavior.

The operating system, running in privileged mode, controls theprotection provided to problem state user code. The server may or maynot include hypervisor support. In the absence of a hypervisor, theoperating system has the same authority as the hypervisor would havehad. With a hypervisor, which is required if the server is using logicalpartitions, the operating system requests Local mapping table ortranslation table updates from the hypervisor. This enables thehypervisor to isolate the behavior of one operating system from anotherwithin the same physical server.

User code, running in problem state, can only access memory within thelocal server or communicate with software running in other servers thatthe hypervisor and operating system have enabled.

The first level of protection is provided by the server's addresstranslation mechanism used to convert the effective address associatedwith a message passing user command into the real address used by themessage passing hardware. This mechanism insures that user commands canonly access channels allocated to that code by the local operatingsystem. It also insures that only authorized code can issue privilegedcommands to the hardware.

Once user code is given access to a channel, the message passing addresstranslation logic insures that the user can only tell the messagepassing hardware to access local memory regions allocated to it for thispurpose by the local operating system. Software in one server has noknowledge of or direct access to memory in another server except throughchannels maintained by software in the two servers. Software on eachside defines the portion of its memory that can be accessed externallyand defines the type of access, read or write, push or pull allowed.

There is also provided a user key protection mechanism that enablessoftware to identify all of the channels used by a specific applicationletting these channels exchange information, but preventing them fromcommunicating with other channels or letting other channels interferewith them. This mechanism uses a user key field in each channel's Localmapping table entry established by operating system or hypervisorsoftware. Every packet includes the sending channel's user key value. Areceiving adapter discards a packet if the packet's user key doesn'tmatch the receiving channel's user key. Software can deactivate themechanism by using a universal key value of all one's. Protectionviolations due to mismatched user key values are not considered severefailures. The data transfer is, of course, canceled without impactingthe receive side channel and the send side descriptor is marked with thenonfatal channel unavailable condition, but the send side can continueother operations or retry the failed operation at a later time. Thisallows individual tasks within a larger job to start or stop atdifferent times without requiring special interlocking procedures beforeattempting communications or shutting down.

Address Translation

The architecture of the present invention allows user level code tobuild descriptors that control data movement between servers. Thesedescriptors are physically located in memory. They point to other memorylocations containing the actual data to be transferred. These memoryregions are intended to be managed directly by problem state code. Theserver includes address translation logic that protects user memoryareas from other users and converts effective address values managed byuser code into a real address values used by processor hardware. Messagepassing address translation logic provides similar function for messagepassing operations. When a channel is defined, operating system softwaredefines a single virtually contiguous memory region within the user'saddress space. This region contains the descriptors and data buffersused by that channel. The message passing address translation logicconverts this information to real memory address values. Each channelmay address up to 256 terabytes of memory using a 48 bit buffer offsetvalue contained with descriptors. The hardware views the offset value asa 48 bit virtual address within the address space used by that channel.The address translation function converts it into a 64 bit real addressvalue presented to the memory system. Most implementations use fewerreal address bits than the 64 provided. These values are not criticalparameters for either the design or operation of the present inventionviewed in its broadest scope. See FIGS. 9, 10 and 11.

The channel's address translation mechanism supports the usual 4K bytepage size and also a 16M byte page size. The 4K page is intended tosupport traditional user level code. The 16M page is intended to improvethe efficiency of user level code in cases where this larger page sizeis available. The address translation table itself is always containedwithin 4K pages. Address translation can be disabled for use with kernellevel code running without a hypervisor.

The address translation process uses a translation table in memorycontaining Translation Control Elements, TCE. The table is constructedof from one to four separate levels. The translation sequentiallyaccesses a series of table entries with the last defining the full realaddress value. The page size and number of levels used determines themaximum size of the address space available. This multilevel lookupprocess allows translation tables to be built over physicallynoncontiguous memory regions. A channel's Local mapping table entryspecifies the page size, number of table levels, size of the addressspace, and origin of the first table to be accessed. The softwaredefining the Local mapping table and translation tables insures that theresulting real address value is valid for that system. Details ofTranslation Control Elements fields can be found elsewhere herein.

The processor and adapter each have their own address translationmechanism. Any physically contiguous 16M memory area may be treated aseither a single 16M page or multiple 4K pages in either translationmechanism. It may be treated differently by the processor and theadapter. Each channel specifies a single page size to be used by theadapter when accessing memory for that channel. A 16M page size requiresthat the entire channel's address space contain only 16M physicalregions. A 4K page size does not have any restrictions and may always beused. See FIGS. 10 and 11.

Channels referencing 4K pages may use 1, 2, 3, or 4 translation levels.This provides memory addressability of up to 2M, 1G, 512G, or 256Trespectively. The least significant 12 bits of the real address areobtained directly from the least significant 12 bits of the virtualaddress (or buffer offset value). The remaining 52 real address bits areobtained from the level 1 translation table entry (along with the typeof access permitted). The most significant 36 virtual address bits areused to index into an 8 byte entry within each of the 4 levels. The mostsignificant 9 bits index into the level 4 entry or must be zero if notusing 4 levels. The next 9 bits index into the level 3 entry or must bezero if not using at least 3 levels. The next 9 bits index into thelevel 2 entry or must be zero if not using at least 2 levels. The last 9bit field is used to index into the level 1 entry. The origin of thelevel 4 entry is always found in the channel's Local mapping tableentry. The origin of level 3 is found in the level 4 entry if using 4levels or in the Local mapping table if using 3 levels. The origin oflevel 2 is found in the level 3 entry if using 3 or 4 levels or in theLocal mapping table if using 2 levels. The origin of level 1 is found inthe level 2 entry if using 2, 3, or 4 levels or in the Local mappingtable if using 1 level.

Channels referencing 16M pages may use 1, 2 or 3 translation levels.This provides memory addressability of up to 8G, 4T, or 256Trespectively. The least significant 24 bits of the real address areobtained directly from the least significant 24 bits of the virtualaddress (or buffer offset value). The remaining 40 real address bits areobtained from the level 1 translation table entry (along with the typeof access permitted). The most significant 24 virtual address bits areused to index into an 8 byte entry within each of the 3 levels. The mostsignificant 6 bits index into the level 3 entry or are zero if not using3 levels. The next 9 bits index into the level 2 entry or are zero ifnot using at least 2 levels. The last 9 bit field is used to index intothe level 1 entry. The origin of the level 3 entry is always found inthe channel's Local mapping table entry. The origin of level 2 is foundin the level 3 entry if using 3 levels or in the Local mapping table ifusing 2 levels. The origin of level 1 is found in the level 2 entry ifusing 2 or 3 levels or in the Local mapping table if using level 1. Asabove, and elsewhere herein, these specific values are not criticalparameters for either the design or the operation of the presentinvention viewed in its broadest scope.

Adapter Identification

Software identifies the remote adapter involved in a transfer through adescriptor logical ID field. Before starting an operation, the softwareinitiating the transfer indicates in the controlling descriptor theidentification of the remote adapter to be used along with the remoteadapter's channel number. During send-receive operations, hardwareinserts the logical ID value of this initiating adapter and its channelnumber in the target's descriptor. When the operation completes, thedescriptor on each side identifies the other side's logical ID andchannel.

Software doesn't necessarily use a uniform system wide nomenclature toidentify adapters, but rather can use a logical value of significanceonly within the local adapter. There are hardware tables within eachadapter that let the hardware match the logical ID nomenclature usedlocally with the nomenclature used by adapters it communicates with.Every adapter uses a set of logical ID values from 0 to someimplementation maximum to identify the adapters it can communicate with.This method makes it easier to build a system where individual adaptersdo not necessarily communicate with all of the other adapters in thesystem. It also simplifies the use of multiple adapter types where someadapters may support communications with more adapters than other types.The architecture requires that each adapter implement approximately 40bytes of internal table space for each adapter that it communicateswith. This can add up to a substantial amount of hardware for largesystems. Adapters targeted for large configurations include sufficientresources to communicate among up to 4095 adapters, while adapterstargeted for smaller configurations do not need to include as manyresources.

The hardware accesses a number of internal tables whenever it needs tosend a packet to another adapter or to verify that it can process apacket received from another adapter. The tables include informationsuch as the next packet sequence number to be sent to the remoteadapter, or the next packet sequence number to expect from it, or whichof four potential paths to the adapter is currently active, or adescription of the physical route packets should take to get to it. Thehardware uses the logical ID value associated with the remote adapter toindex into these tables. One of the tables, known as the Path Table,indicates the logical ID value that the remote adapter uses to identifythe local adapter. This value is included in all packets sent to thetarget to identify, in the target's terminology, which adapter sent thepacket.

A special logical ID value of all one's represents a broadcast ID usedonly during broadcast operations. Software specifies this broadcast IDvalue in the controlling descriptor to indicate that information shouldbe sent to all remote adapters. See elsewhere herein for details.

A uniform system wide nomenclature also exists in the form of a physicalID value, however it is only used by the hardware to verify that packetsare delivered to the correct destination. The physical ID of a targetadapter is obtained from the hardware Path Table along with the logicalID value that the target uses when referencing the local adapter. Seeelsewhere herein for details.

Note that, although message passing hardware is normally used to sendinformation to a different server, it is also possible to target anotheradapter within the same server or to target another channel within thesame adapter.

Transmission Modes

The message passing architecture of the present invention defines threelevels of transmission reliability: unreliable, reliable delivery andreliable acceptance. Push operations can use any mode, pull operationscan use either one of the reliable modes, and remote read/write usesreliable acceptance. Reliable acceptance mode for push or pulloperations is not supported.

The terms reliable and unreliable are used throughout the industry, butare somewhat misleading. Accordingly, it should be understood that, asused herein, these terms have specific meanings. All transmissionsexecuted in the context of the present invention are, in fact, highlyreliable with significant error detection and retry. The difference isthat the hardware guarantees in-order exactly once type delivery withinthe constraints imposed by software or hardware availability forreliable transfers while it only insures due diligence for unreliabletransfers. The degree of reliability is indicated in the mode field ofthe Local mapping table. Regardless of the type of reliability selected,all links are continuously monitored for potential loss of integrity.They automatically go through a retiming procedure that adjusts skewbetween individual signals when necessary to insure that datatransmissions are not corrupted. Every packet includes two levels ofCyclic Redundancy Check (CRC) verification. If a packet is corruptedover an individual link, the transfer is retried up to four times, thenthe link is retimed up to two times and the transfer tried again. Allpackets also include a time stamp of when it was launched along with theunique physical ID of the intended target. Receivers discard packetsincorrectly delivered or identified as stale.

The unreliable transmission mode is only available for push- operationsinvolving no more than 2,048 bytes per source of push descriptor (orcombined preload data and source of push). Although not requiredarchitecturally, applications normally also restrict the matching targetof descriptor to no more than 2,048 bytes—the maximum amount of datatransmitted in single packet in preferred embodiments of the presentinvention. This mode is required when using the broadcast function (seeelsewhere herein) or the channel group function (see elsewhere herein).The hardware does not guarantee packet delivery nor does it indicate ifa transfer is successful or unsuccessful. The determination of successor failure and the recovery of failed transmissions is performed usingsoftware methods. When using software that includes such function, theunreliable transmission mode can be used to eliminate the extra linkactivity that would be caused by both hardware and software duplicatingthe function. Because of the retry mechanism associated with individuallinks, most end-to-end transmission failures are the result of either aphysically defective cable or due to the target being powered off orhaving encountered a server checkstop condition. Recovery from thelatter conditions are not practical. Recovery due to a cable failure ispossible by simply retrying the failed transmission using the samechannel and descriptor as originally created. The service networkdefines four separate routes to every possible target. The hardwarerandomly picks one of these four routes for each packet sent using theunreliable mode. Each retransmission has a probability of using a routebypassing the failed component.

The reliable delivery transmission mode guarantees that the packets aredelivered in order and that they are delivered only once to the targetedadapter but does not indicate if the targeted channel can accept theinformation nor does it provide any information about when the targetedmemory is updated. This mode is available for all push or pulloperations. The hardware maintains two time out mechanisms not usedduring unreliable transmissions. For every packet sent to the target,the sending adapter usually receives an echo packet back within areasonable period of time indicating that the packet was correctlydelivered. The adapter retries failed transmissions twice on up to fourseparate paths between the two adapters. If all attempts fail, theoperation is canceled and a connection failure is reported. Serversoftware is not aware of which of the four possible paths is actuallyused. Every adapter also maintains a unique set of sequence numbers forevery adapter to which it communicates. These sequence numbers allow thetarget to discard packets not received in the correct order or receivedmultiple times due to retransmission. This, along with the time out andretransmission mechanisms provided in the sending adapter, insurein-order exactly once type reception. A second timet mechanism ismaintained by the receiving adapter. If it fails to receive the nextpacket of a multi-packet transfer within a reasonable time it cancelsthe operation and records a connection failure.

The reliable acceptance transmission mode provides the same guaranteesas reliable delivery plus information about the targeted channel andinsures that the targeted memory is updated before the source descriptoris updated indicating transfer completion. It is available for alloperations. It includes all of the mechanisms associated with reliabledelivery. It also causes the targeted adapter to return a responsepacket providing data requested during a remote read operation orindicating that memory has been updated or indicting the reason theoperation could not be completed. The initiating adapter maintains athird time out mechanism waiting for this response and reports aconnection failure if it is not received within a reasonable timeperiod. The targeted adapter sending the response expects to receive anecho packet indicating that the response was delivered and similar toall reliable transfers retries the operation multiple times overmultiple paths if necessary.

Regardless of the reliability mode, the hardware cannot recover frommistakes software might make in setting up the transfer nor is itcapable of delivery to targets that have been taken off-line. Inaddition, reliable transmissions cannot usually guarantee deliveryunless there are redundant paths available to the intended target. Thereliable delivery mode does flag when a hardware condition prevents asuccessful transmission and the reliable acceptance mode flags wheneither a hardware or software condition prevents a successful transfer.

Broadcast Function

The broadcast function provides assistance to software needing to send acommon message to all adapters within the same network. It lets softwareindicate that an unreliable push operation is directed to all remoteadapters rather than to just one adapter. The hardware replicates theinformation to all adapters attached to a common network. This functionuses the Logical Address Routing capability in the switch where packetsare replicated from a single. switch chip input port to multiple outputports. The message may be further replicated among multiple channelswithin the receiving adapters by using the channel group function asdescribed elsewhere herein.

A channel initiating a broadcast operation uses unreliable protocols,uses a source of push type descriptor (see elsewhere herein), or thepreload data/source of push combination, with a data count of no morethan 2,048 bytes, and uses the special broadcast ID value, of all one's,to identify the target adapter. The channel may also be used to transmitnon-broadcast unreliable push operations by specifying the logical ID ofthe intended target adapter rather than using the broadcast ID value.

Software allocates a channel with special characteristics to receivebroadcast operations. All adapters on the network, including theinitiating adapter, receive a copy of the broadcast operation. Thesource of push descriptor identifies a single channel number to be usedby all receiving adapter. All receivers reserve a common channel numberfor similar broadcast functions. That channel has defined one or moretarget of push descriptors. Software may choose to let multiple adapterssend information to this channel. It is expected that all adapterswithin the network participate in the broadcast operation. However, areceiving adapter discards an incoming broadcast operation if thetargeted has user key value conflicting with that of the issuingchannel. This allows the broadcast operation to function, somewhat, as amulticast operation.

A target of push descriptor receiving a broadcast operation is updatedby hardware in a manner similar to processing unreliable non-broadcastoperations except that hardware sets the source logical ID field to thebroadcast ID value of all ones.

Packets generated for non-broadcast operations include a fieldspecifying the physical ID value of the targeted server. This enables anadapter receiving the packet to determine if a routing failure caused anincorrect delivery. Broadcast operations being targeted to multipleadapters can't perform this check. Hardware inserts a special value ofall one's representing the universal ID value. This value causes thereceiver to override the normal check accepting the packet.

The adapters of the present invention allow networks to be physicallyconstructed of either one or two switch planes with the adapter routingpackets between planes when necessary. Broadcast operations rely onswitch hardware to replicate a packet throughout a plane. However, thereis no direct connection between planes in the two plane configuration asshown in FIG. 13.

In this environment, a broadcast operation is delivered to all adaptersattached to the plane directly driven by the issuing adapter, but not toany adapter on the other plane. Software attempting to reach alladapters initiates two separate broadcasts operations, one to eachplane.

Channel Group

The channel group function allows multiple channels within a singleadapter to be linked together such that received messages targeted tothe group are automatically replicated and presented to all channelswithin the group. Channel groups may only be used to receive unreliablepush operations with target of push, branch, or end-of-list conditiontype descriptors. They are primarily used along with the broadcastfunction when the receiving adapter is shared by multiple applicationsor operating systems and each receives the message. The broadcastfunction propagates an operation to multiple adapters while the channelgroup function propagates it to multiple channels within each adapter.Although broadcast requires specification of the same channel in everyadapter receiving it, each adapter may have a unique channel groupdefined or not have any group defined.

A packet sent to a channel group is independently examined by everychannel in the group. Detection of an error condition associated withany single channel does not prevent processing of the packet by otherchannels. An individual channel only records information from the packetif the channel is marked valid, has not encountered a fatal conditionhalting the channel, has a valid target of push descriptor available,,and has a user key value compatible with the sending channel. If theseconditions are not satisfied, that channel does no further processing ofthe packet but instead passes the information on to the next channel inthe group.

Software defines a channel group as a linked list of channels usingspecial fields in the Local mapping table entries of the channel'sinvolved. The first channel in the linked list is referred to as theanchor. This anchor is the only channel in the group that may bereferenced in source of push descriptors targeting the group. Incomingpackets that are targeted to a channel that is part of a channel groupbut which is not the anchor channel are discarded.

Processor Interrupts

The adapter generates a processor interrupt either because it detectedan internal-hardware failure affecting all adapter operations or, morelikely, because an event occurred significant to a specific channel. Anindividual channel can generate a processor interrupt due to detectionof:

-   -   1. a nonfatal condition such as: completed, insufficient space,        channel unavailable, or connection failure;    -   2. a fatal condition such as: failed to start, failed to        complete, channel stopped, channel failure, or messaging        failure.        Non-fatal conditions reflect either the normal completion of        specially marked data transfers or an easily retriable exception        condition. Fatal conditions reflect serious conditions        preventing successful transfers. Fatal conditions halt all        further processing on that channel until software corrects the        situation. Non-fatal conditions do not prevent further        processing. All conditions are explained in the exception        handling description provided below. Non-fatal conditions are        also extensively discussed in the description herein of        individual descriptor types.

The hardware maintains an Interrupt Status Register, ISR, and aninterrupt queue for each interrupt level supported. The queue identifiesall the channels with active requests for that interrupt level. Thequeue is implemented by forming a linked list of Local Mapping Tableentries. When a channel activates an interrupt, that channel is insertedat the end of the list for the interrupt level it uses. The operatingsystem interrogates an interrupt queue with the privileged readinterrupt queue command.

A channel's Local Mapping Table entry includes an architecturallydefined interrupt control field established by software to personalizethat channel's interrupt processing capability and an channel statusfield maintained by the hardware to record interrupting conditions, plussufficient implementation dependent information to maintain one elementof a linked list interrupt queue. The interrupt control field providesthe ability for the operating system to enable or suppress interruptsfor nonfatal conditions. If an application requests an operationinvolving an interrupt without authorization from the operating system,the hardware performs all of the operations requested, includingflagging the condition in the channel status field, but does notactually generate the interrupt and does not place the channel in theinterrupt queue. Fatal error conditions also produce an interrupt. SeeFIG. 14.

A channel requesting a processor interrupt for a nonfatal condition maycontinue processing additional descriptors. This may result inencountering additional interrupting conditions. However, new interruptsare generated only if software has completed processing of the originalinterrupt. The first interrupt sets information in the channel's channelstatus filed in the Local mapping table, thus preventing that channelfrom invoking additional interrupts until the field is cleared with aclear condition command. Software may choose to extend this period byissuing a suppress interrupt command—and eventually an enable interruptcommand.

Multiple channels may independently request processor interrupts.However, similar to the case of a single channel requesting multipleinterrupts, the new interrupts are generated only if software hascompleted processing of the original interrupt. The first interrupt setsa bit in the interrupt status register preventing any additionalinterrupts from other channels until it is cleared. It may be directlycleared by software using the write interrupt status command orindirectly cleared by the hardware when a read interrupt queue commandindicates that there are no entries on the queue.

The detection of a fatal or nonfatal condition normally causes thehardware to place the channel on an interrupt queue and generates aprocessor interrupt. However, the hardware combines multiple events intoa single interrupt whenever possible. Software uses the read interruptqueue and clear condition commands, possibly along with the suppressinterrupt, enable interrupt, and reset channel commands to remove aninterrupt condition and to control when the channel can generate anotherinterrupt. Each channel maintains a two bit interrupt state within theLocal mapping table channel status field to control interruptprocessing. The values employed are indicated in Table 2 below: TABLE 200 Channel has no active interrupt (although one may be waiting for anenable interrupt command), is not on an interrupt queue, and the clearcondition command is ignored. 01 Channel is on an interrupt queuewaiting for a read interrupt queue command and the clear conditioncommand is ignored. 10 Channel has processed a read interrupt queuecommand, is not on an interrupt queue, does not have another nonfatalcondition pending (although a fatal condition may be waiting for a clearcondition command), and is waiting for a clear condition command. 11Channel has processed a read interrupt queue command, is not on aninterrupt queue, does have another nonfatal condition pending (andperhaps a fatal condition) and is waiting for a clear condition command.

Interrupt control and status parameters are modified during theexecution of several commands and when a fatal or nonfatal condition isdetected according to the following table: TABLE 3 status before commandor event status after command or event command interrupt suppress fatalnonfatal interrupt generate fatal nonfatal suppress or event state bitstatus status state interrupt status status bit open channel 00, 10, 11x x x 00 no 0 0 0 01 x x x 01 no 0 0 0 reset channel 00, 10, 11 x x x 00no 0 0 0 01 x x x 01 no 0 0 0 clear channel 00, 01 x x x unchanged nounchanged unchanged unchanged 10 x 0 x 00 no unchanged 0 unchanged 10 x1 x 01 yes unchanged 0 unchanged 11 1 0 x 00 no unchanged 1 unchanged 110 x x 01 yes unchanged 1 unchanged 11 x 1 x 01 yes unchanged 1 unchangedread Interrupt queue 00, 10, 11 x x x unchanged no unchanged unchangedunchanged 01 x 0 0 00 no unchanged unchanged unchanged 01 x 1 x 10 nounchanged unchanged unchanged 01 x x 1 10 no unchanged unchangedunchanged suppress interrupt x x x x unchanged no unchanged unchanged 1enable interrupt 00 x x 1 01 yes unchanged unchanged 0 00 x x 0 00 nounchanged unchanged 0 01, 10, 11 x x x unchanged no unchanged unchanged0 nonfatal event 00 1 x x 00 no unchanged 1 unchanged 00 0 x x 01 yesunchanged 1 unchanged 10 x x x 11 no unchanged 1 unchanged 01, 11 x x xunchanged no unchanged 1 unchanged fatal event 00 x x x 01 yes 1unchanged unchanged 01, 10, 11 x x x unchanged no 1 unchanged unchanged

Every read interrupt queue command identifying a given channel iseventually followed by a clear condition command issued to that channelto enable additional interrupts. The Clear condition command can beissued anytime but is ignored unless a prior read interrupt queueidentified the channel.

All nonfatal events occurring between a read interrupt queue commandidentifying a given channel and a clear condition command issued to thatchannel are combined into a single interrupt and presented whenprocessing clear condition if interrupts are enabled. If interrupts aresuppressed when clear condition is issued then the interrupt ispostponed until an enable interrupt command is processed.

All fatal events occurring between a read interrupt queue commandidentifying a given channel and a clear condition command issued to thatchannel are combined into a single interrupt and presented whenprocessing the clear condition regardless of the status of the suppressinterrupt mode. Any channel with a fatal condition regenerates aninterrupt during processing of clear condition.

When the hardware processes an interrupt, the following sequence ofoperations occur:

-   -   1. detect a fatal or nonfatal condition;    -   2. determine that software has enabled an interrupt for this        condition (fatal conditions are always enabled; nonfatal        conditions are enabled using interrupt control bit 0);    -   3. record the type of condition (fatal conditions are recorded        in channel status bits 12-15; nonfatal conditions set channel        status bit 1 and identify the reason in the descriptor condition        code field);    -   4. determine that software has not suppressed the condition        (fatal conditions can not be suppressed; nonfatal conditions can        be suppressed (or postponed) by setting interrupt control bit        2—the suppress interrupt and enable interrupt commands control        this bit)    -   5. determine that the channel doesn't currently have an        interrupt pending (determined using the interrupt state bits        within the channel status field of the Local mapping table);    -   6. identify which interrupt level is used by that channel        (indicated by interrupt control bits 8-15);    -   7. add the channel to the interrupt queue for that interrupt        level; and    -   8. set the Interrupt Status Register, ISR, message passing bit        for the appropriate interrupt level (the adapter sends an        interrupt request transaction to the server's interrupt        controller and enters an interrupt state for this level when it        sees an active message passing bit; the adapter ignores the        value of this ISR until it receives an end of interrupt        transaction from the server interrupt controller causing it to        exit the interrupt state).

When the software processes an interrupt, the following sequence ofoperations occur:

-   -   1. use read interrupt status command(s) to identify the adapter        having an active ISR message passing bit;    -   2. if desired use the write interrupt status command to reset        the ISR message passing bit (this allows software to schedule a        lower priority routine for checking the interrupt queue rather        than remaining in the more time critical interrupt handler        routine and, if used, it is followed by a read interrupt status        command to insure completion before the next step);    -   3. use the read interrupt queue command to identify the        channel(s) needing service;    -   4. if desired issue the suppress interrupt command to avoid        additional nonfatal interrupts for that channel (this allows        software to process multiple nonfatal conditions with only a        single interrupt);    -   5. use the clear condition command to remove the condition from        the channel's channel status field (another interrupt is        generated if a fatal condition is also recorded in the channel        status field; a fatal condition occurring while the descriptor        list is processed immediately invokes another interrupt);    -   6. search through the descriptor list to identify the reason(s)        for any nonfatal condition (software may repeat the clear        condition command to remove any pending nonfatal condition that        occurred while processing the descriptor list, however it then        rechecks the last list element; and    -   7. use the enable interrupt, command, if necessary, to resume        normal interrupt servicing (another interrupt is generated if        the channel status field has recorded a pending nonfatal        condition).        At some point the software tells the server interrupt controller        to reset it's interrupt controls (thus sending an end of        interrupt transaction to the message passing adapter). This can        be done any time after the ISR message passing bit is reset.

Marking Functions

The send-receive model assumes a certain level of cooperation betweenthe sender and the receiver. It is sometimes desirable to send datawithout the receiver knowing exactly how much data is to be transferred.Both sides have agreed on the maximum data count, but would like tosometimes transfer less than this maximum. It is also possible thatsoftware has established multiple receive side descriptors inpreparation for several messages and wants to make sure that oneincoming message can't spill beyond the space allocated to it due to asend-side software error. The architecture of the present inventionprovides an optional marking function to handle these two scenarios. Thefirst case uses send-side marking while the second uses receive-sidemarking.

Marking is invoked by software setting a local buffer is marked bit inthe local descriptor to indicate that that descriptor is marked. Thismay be on either the sending or receiving side. Marking is provided forreliable push and for reliable pull operations. The function is notprovided for remote read/write operations.

Send-Side Marking

Software can set a local buffer marked flag bit in the descriptorproviding data for a push or for pull operations. This indicates thatthe last byte sent using that descriptor as something special. It is theend of a message, block, or some other unit of work significant tosoftware. The receive side hardware records exactly how much space wasreally used in the receiving buffer, and updates that descriptor asbeing completed. The next incoming data targeted to the same channeluses the next descriptor in the list. Software may setup the receivedescriptor to generate a processor interrupt in the receive server sothat it can immediately start processing the data.

Receive Side Marking

Software on the side receiving push or pull data can also set a localbuffer marked flag bit in its descriptor. This flags the last byte ofthe buffer associated with the receiving descriptor as somethingspecial. It is the last position available for an incoming message orsome kind of significant software block. It really says “I won't acceptmore data than this from a single send descriptor.” The receive sidediscards any additional data until the sender's current descriptor isexhausted. The marked receive-side descriptor is considered completeonly when this point is reached. The receiving descriptor is alwaysupdated by the hardware to indicate how much of the receiver's bufferwas actually used. A flag bit in the descriptor is also set if data isdiscarded. However, there is generally no indication on the send side ofhow much data was actually saved by the receiver.

Receive side marking can result in data being discarded. This is notnecessarily an error condition and is not treated as an error by thehardware. When data is discarded, hardware sets a flag bit in both ofthe descriptors involved in the transfer. The amount of data discardedis not recorded.

Commands

The present section identifies how software accesses various messagepassing hardware functions, including a minimum set of system servicesprovided by the operating system, the commands that user level code maydirectly issue to the hardware, and the commands the operating systemuses to control or update the hardware.

Server software accesses a message passing adapter by issuing an eightbyte non-cacheable load or store instruction using a special realaddress value. Each adapter is assigned a unique 256 megabyte addressregion used by application code to control its set of channels plus a 4megabyte region used by the operating system or hypervisor to manage theadapter itself. The server uses the address value to direct theseinstructions to one of the available message passing adapters ratherthen to memory while that adapter uses the address value to identify theexact function, or command, desired. The preferred architecture allowsup to 64 real address bits. However, the actual number of bits used andthe actual set of real address values allocated to the adapter maychange from one system to another. Application code accesses the adapteronly if operating system software grants such access by creating anaddress translation page table including the desired real addressvalues. Application code is required to have access to the functionsknown as user commands. These commands have an effective address format,or address value as seen by the application software, defined by thearchitecture. The functions that are not required to be made availableto application level code are referred to as privileged commands. Theoperating system may choose to give application code read only access toseveral of the privileged commands that do present either a security oroperational exposure.

The adapters for two embodiments of the present invention implement thesame set of commands. The systems of the present invention use a commondefinition for the least significant 28 real address bits associatedwith user commands and the least significant 22 bits associated Withprivileged commands. A first embodiment implements 42 real address bitswhile a second embodiment implements 52 real address bits. The adapterfor the first embodiment is personalized during adapter initializationwith a set of 14 high order address bits that it responds to as usercommands and one set of 20 high order address bits that it responds toas privileged commands. The adapter for the second embodiment ispersonalized with 24 bits for user commands and 30 bits for privilegedcommands. TABLE 4 Command Summary 52 or 42 bit real address valueOperation Function UUUU UUUU UU UU UUUU UUUU UUUU00CC CCCC CCCC CCCC 0000 0000 0000 8 byte store 8 byte storeUUUU UUUU UU UU UUUU UUUU UUUU 00CC CCCC CCCC CCCC 0000 0001 0000 8 bytestore prefetch UUUU UUUU UU UU UUUU UUUU UUUU00CC CCCC CCCC CCCC 0000 0010 0000 8 byte store suppress interruptUUUU UUUU UU UU UUUU UUUU UUUU 00CC CCCC CCCC CCCC 0000 0011 0000 8 bytestore enable interrupt UUUU UUUU UU UU UUUU UUUU UUUU00CC CCCC CCCC CCCC 0000 0100 0000 8 byte store clear conditionUUUU UUUU UU UU UUUU UUUU UUUU 00CC CCCC CCCC CCCC 0000 0101 0000 8 bytestore step message PPPP PPPP PP PP PPPP PPPP PPPP PPPP PP00 0001 LLLL 0000 0000 0000 8 byte load read interrupt status 8 bytestore write interrupt status PPPP PPPP PP PP PPPP PPPP PPPP PPPP PP10 0000 LLLL 0000 0000 0000 8 byte load read interrupt queuePPPP PPPP PP PP PPPP PPPP PPPP PPPP PP 10 0001 0000 0000 0000 0000 8byte store stop channel PPPP PPPP PP PP PPPP PPPP PPPP PPPP PP10 0001 0000 0000 0001 0000 8 byte store resume channel PPPP PPPP PP PPPPPP PPPP PPPP PPPP PP 10 0001 0000 0000 0010 0000 8 byte store resetchannel PPPP PPPP PP PP PPPP PPPP PPPP PPPP PP10 0001 0000 0000 0011 0000 8 byte store select channel PPPP PPPP PP PPPPPP PPPP PPPP PPPP PP 10 0001 0000 0000 0100 0000 8 byte load testchannel PPPP PPPP PP PP PPPP PPPP PPPP PPPP PP10 0001 0000 0000 0101 0000 8 byte store open channel PPPP PPPP PP PPPPPP PPPP PPPP PPPP PP 00 0010 0000 0000 0000 0000 8 byte load read TODPPPP PPPP PP PP PPPP PPPP PPPP PPPP PP 00 0010 1011 0000 0000 0000 8byte load read physical ID register 8 byte store write physical IDregister PPPP PPPP PP PP PPPP PPPP PPPP PPPP PP10 0010 0010 0000 0010 0000 8 byte load read SRAM address register 8byte store write SRAM address register PPPP PPPP PPPP PPPP PPPP PPPPPPPP PP 10 0010 0010 0000 0011 0000 8 byte load read SRAM data &increment address 8 byte store write SRAM data & increment addressLegend Italicized address bits indicate those that are defined duringinitialization for either embodiment. Underscored address bits indicatethose that are defined during initialization of the second embodiment.Doubly underscored bits indicate those that are defined by adapterdesign point. UUUU UUUU UU UU UUUU UUUU UUUU Address value defined bysystem for user commands to a specific adapter. PPPP PPPP PP PP PPPPPPPP PPPP PPPP PP Address value defined by system for privilegedcommands to a specific adapter. LLLL Identifies 1 of 16 interruptlevels. CC CCCC CCCC CCCC Identifies 1 of 16K channels on the selectedadapter.

System Services

The operating system provides many services for user level code insupport of this architecture. The hardware architecture herein interactswith the software to provide some a command structure to allocatechannels and to deallocate channels.

Allocate Channel

Before user level code can use the message passing function, it requestsa channel from the operating system. The operating system allocates andinitializes all of the hardware facilities associated with the channel.Many variations of this behavior are possible. The operating system may,for example, allocate memory from a common buffer pool for descriptorsand data or may use memory previously assigned to that user. However,the architecture does require that some means of allocating channels beprovided and that part of this allocation include initializing thatchannel's Local mapping table entry, updating the processor's addresstranslation logic to point to this entry, building a message passingaddress translation table, and initialization of the descriptor listpointed to by the new Local mapping table entry to a descriptor with anend of list condition. The Local mapping table, as described below, hasinformation provided by the operating system or hypervisor, plusreserved areas used by the hardware to record status information whileprocessing that channel. As part of the allocate channel process,software defines the architected areas within the first four doublewordsof the Local mapping table and then issue the open channel commanddefined elsewhere herein to let the adapter initialize the remainingareas and to move the channel into the valid state. Following the Localmapping table definition, the user is told the allocated channel IDvalue, the channel number, the channel's logical id value, location ofthe descriptor list and memory regions made available to it and to themessage passing hardware.

Deallocate channel

For every allocate channel there is provided a mechanism to deallocateit. The reset channel command is issued as part of this process to movethe channel's hardware state to invalid.

User Commands

Application code operating in a problem state, or untrusted mode, maydirectly control message passing operations after the operating systemhas allocated and initialized the hardware facilities associated with achannel. These operations take the form of a store instruction issued toa special memory address region associated with the message passinghardware. This has traditionally been referred to as an MMIO (MemoryMapped I/O—not to be confused with Direct Memory Access (DMA))operation. The address portion of the store command identifies thephysical adapter, channel and the type of operation to be performed. Thedata portion of the store command is ignored. A command targeted to anonexistent channel or to a channel in the invalid state is discarded.Careless or improperly invoked user commands can negatively impactoperations on that channel but can not damage other channels.

Each server reserves a set of real address values for user commands.This range includes a 4K byte page for every message passing channel.The format allows up to 64K channels per adapter occupying a total of 4gigabytes within the node's real address space.

When a channel is allocated, the operating system defines a page tableentry in a special format that is accessed whenever software issues oneof the user commands. The operating system gives a channel ID value touser software as part of the allocate channel system service. Thischannel ID value along with a 12 bit command code is used as theeffective address value supplied by software when issuing a usercommand. The node's address translation logic uses this to access thepage table entry created for this purpose by the operating system andproduces the real address value given to the hardware. The real addressvalue falls within the memory range allocated for this purpose. Theaddress fields defined for one embodiment of the present invention areshown in FIG. 15. The significance for these fields is summarized in thetable below: TABLE 5 Bits in one Field embodiment Significance channel52 The value given the user by the operating ID system to reference thischannel. It is used by the node's address translation logic to referencethe page table entry associated with the channel assigned by theoperating system when the channel was allocated. command 12 Indicationof the type of operation desired. The hardware flags a fatal failed tostart condition in the Local mapping table if the code point is invalid(note: the adapter may ignore selected bits). The following command codepoints are defined: 0000 0000 start message 0000 0000 0001 prefetch 00000000 0010 suppress interrupt 0000 0000 0011 enable interrupt 0000 00000100 clear condition 0000 00000101 step message 0000 command 14 The mostsignificant real address bits space implemented by one embodiment whichdefines the memory region assigned to user commands on a specificadapter. The other embodiment expands this field to 24 bits. channel 16The Local mapping table entry associated with this channel.Note:One embodiment of the present invention implements 52 real address bitswhere the size of the command space field is expanded to 24 bits.Start Message

The start message command, code 0×000, is used to initiate most messagepassing transfers. It tells the hardware that software has defined acompatible set of channels and descriptors on both the sending andreceiving sides when using the send-receive transfer model or a set ofchannels on both sides and descriptors on the master side when using theremote read/write model. The command schedules processing for a seriesof source of push, preload data, target of pull, remote read, remotewrite, or branch descriptors. Processing continues until an end of listor fatal condition is detected. The command sets a fatal failed to startcondition if the channel is already processing descriptors started witha step message command. Software insures that any previous descriptor ordata buffer update is visible to the adapter before issuing the command.The sync instruction of the IBM PowerPC microprocessor chip may beissued prior to the command to accomplish this. The start messagecommand has no effect if the channel points to a target of push, sourceof pull, or descriptor with an end of list condition. A channel in thestopping or stopped state accepts the command and schedules activity tostart when the channel is moved to the valid state.

Step Message

The step message command, code 0×050, is used as an alternative to thestart message command when initiating a push operation. The adapterkeeps track of how many step message commands are received and processesexactly one source of push descriptor for each one. After processing therequired descriptors, the adapter prefetches the next descriptor in amanner similar to processing a prefetch command. A subsequent stepmessage then uses this cached information. The command sets a fatalfailed to start condition if an attempt is made to schedule more than255 unprocessed descriptors or if an end of list condition is detectedor if the channel is already processing descriptors started with a startmessage command. The command is intended to handle only source of push,preload data, and branch descriptors. Its behavior with target of pull,remote read, remote write, target of push or source of pull descriptorsis implementation dependent. Software insures that any previousdescriptor or data buffer update is visible to the adapter beforeissuing the command. The PowerPC sync instruction may be issued prior tothe command to accomplish this. A channel in the stopping or stoppedstate accepts the command and schedules activity to start when thechannel is moved to the valid state.

Prefetch

The prefetch command, code 0×010, is used to prepare the hardware for anupcoming operation without actually initiating the transfer. It givesthe hardware a hint that an operation may soon be started providing anopportunity to fetch and cache Local mapping table, translation tableand descriptor information before it is needed. If the prefetcheddescriptor is a branch then the adapter repeats the operation to thedescriptor following the branch. If the prefetched descriptor indicatesan end of list condition, the adapter retains the descriptor's realaddress but records that a new descriptor is needed before processingcan continue. Before loading descriptor, Local mapping table, orTranslation Control Elements (TCE) information, any currently cacheddescriptor data is discarded. Like any caching scheme, the performancebenefit is dependent on the total amount and type of activity going onin that adapter. Before issuing the command, software insures that anyprevious descriptor or data buffer updates are visible to the adapter.The PowerPC sync instruction may be issued prior to the command toaccomplish this. The command is ignored if the channel is not in thevalid state or if a previously issued start message or step messagecommand is not yet completed.

Suppress Interrupt

The suppress interrupt command, code 0×020, gives user level code theability to defer interrupt generation for nonfatal conditions. Suchconditions are recorded in the descriptor list and in the Local mappingtable channel status field but does not invoke a processor interrupt noris recorded in an interrupt queue until the enable interrupt command isissued. The suppress interrupt command sets a bit in the channel's Localmapping table channel status field while the enable interrupt commandresets it.

Enable Interrupt

The enable interrupt command, code 0×030, restores a channel's abilityto generate a processor interrupt for a nonfatal condition after a priorsuppress interrupt command. If a nonfatal condition is pending thechannel is added to the interrupt queue and a processor interrupt isgenerated. Interrupts are also enabled by the open channel command.

Clear Condition

The clear condition command, code 0×040, clears a channel of allnonfatal conditions that occurred before the last read interrupt queuecommand identifying the channel. The Clear condition command is ignoredunless a read interrupt queue command identifies the channel. If anonfatal condition has occurred since processing the read interruptqueue command, and interrupts are not suppressed, the channel is addedto the interrupt queue and a processor interrupt generated to report thenew condition. If a nonfatal condition has occurred but interrupts aresuppressed, then the interrupt is deferred until an enable interruptcommand is processed. If the channel has a fatal condition present, thechannel is unconditionally added to the interrupt queue and a processorinterrupt is generated. The command does not remove the channel from theinterrupt queue (that is accomplished with the privileged read interruptqueue command).

Privileged Commands

Untrusted code is not necessarily given access any hardware facilityother than through the limited functions provided by user commands. Thefacilities controlling basic hardware behavior are only accessed by theoperating system, hypervisor, or service processor. Trusted serversoftware can invoke the set of privileged commands using MMIO type loador store instructions issued to special addresses owned by the adapter.

Control Channel

The control channel set of commands allows software to modify theoperational state of a channel. This set includes: open channel used toenable operations, stop channel and resume channel used to temporaryhalt operations, reset channel used to permanently halt operations, andthe select channel and test channel pair of commands used to interrogatethe channel's status.

The following table describes the various states defined for a channel.FIG. 16 provides a description of the transitions from one channel stateto another. TABLE 6 State Description invalid All channels start in theinvalid state upon adapter initialization and return to this state whena channel is deallocated. The adapter discards any user command issuedto a channel in this state. It also discards any incoming packet,although it does return a response packet with a channel unavailablecondition when it receives a reliable request packet. Software reads ormodifies any LMT field for a channel in this state. Software uses theopen channel command to move a channel from the invalid state to thevalid state during an allocate channel operation after it initializesthe LMT fields. valid A channel in the valid state communicates normallywith other channels. The permissible type of descriptors and packets areindicated by the LMT mode field. Software does not use the read LMT orwrite LMT functions while a channel is in this state. Software does usethe stop channel command to move a channel from the valid to the stoppedstate or the reset channel command to move it to the invalid state. Alluser commands are processed. stopping A channel in the stopping statehas processed a stop channel command but has not yet reached a conditionallowing it to enter the stopped state. A channel in this state does notstart new work but continues processing until it can enter the stoppedstate. Software uses the resume command to move a channel from thestopping to the valid state or the reset channel command to move it tothe invalid state. The start message user command schedules activity tobe started only when the channel is moved back to the valid state.Suppress interrupt, enable interrupt and clear condition user commandsare processed normally while the prefetch user command is ignored.stopped A channel in the stopped state has processed a stop channelcommand and has reach a condition allowing it to stop all furthercommunications activity. While a channel is in this state software maymodify the address translation table or the LMT translation table originfield or the LMT maximum offset field. It may not modify any other LMTfield. Software uses the resume command to move a channel from thestopped to the valid state or the reset channel command to move it tothe invalid state. The adapter discards any incoming packet. A reliablepacket also returns a channel unavailable response if the channel has afatal condition or if the packet has an incorrect user key; otherwise,it records a fatal channel stopped condition and returns a channelstopped response. The start message user command schedules activity tobe started only if the channel is moved back to the valid state. Thesuppress interrupt, enable interrupt and clear condition user commandsare processed normally while the prefetch user command is ignored.resetting Channel in the resetting state have processed a reset channelcommand but haven't yet reached a condition allowing it to enter theinvalid state. A channel in this state does not start new work butcontinues processing until it can enter the invalid state. The adapterdiscards any user command issued to a channel in this state. It alsodiscards any incoming packet although it returns a response packet witha channel unavailable condition when it receives a reliable requestpacket. Software doesn't use the read LMT or write LMT functions.

The open channel command is used by privileged software to complete theprocess of allocating a channel. The adapter initializes reserved fieldswithin the Local mapping table, resets fatal and nonfatal conditions andchanges the channel state to valid. The command is ignored if thechannel is not in the invalid state.

The stop channel command is used by privileged software to quiescechannel operations while the channel's address translation table ismodified. The command moves a channel from the valid state to thestopping state and eventually to the stopped state where software cansafely change the translation table or the channel's translation tableorigin Local mapping table field without impacting in-flight datatransfers. The stopped state is entered only after the channel processesa complete local or remote source of push, source of pull, remote read,or remote write descriptor. A channel has an incomplete target of pushor target of pull descriptor but also has completed the associatedremote source of push or source of pull descriptor. The time periodrequired to reach this point is dependent on the amount of datatransferred, on the response time of the remote channel involved in thetransfer, and on the amount of unrelated activity simultaneouslyprocessed by the adapter. Application code using the channel is largelyunaware of the operating system's actions and/or the channel state. Itneeds only to understand that an operation sent to a remote channel in astopped state responds with a channel stopped condition and is to beretried. This requires additional communication between both sides ofthe transfer to reestablish descriptor lists and buffer space. Theadapter places the channel in the stopping state while waiting forsufficient progress to enter the stopped state. The command is ignoredif the channel is not in the valid state.

The resume channel command is used by privileged software to move achannel back to the valid state after updating the channel's addresstranslation table. The command is ignored if the channel is not in thestopped or stopping state.

The reset channel command is used by privileged software to move achannel from the valid, stopped, or stopping state to the intermediateresetting state and then to the invalid state. The invalid state isentered as soon as the adapter guarantees that it is no longer updatingthe channel's Local mapping table or any memory area associated with thechannel. The command may abort any in-flight operations potentiallyresulting in incomplete data transfers or descriptor updates or maycause a remote channel to report an unavailable condition. The adapterresets fatal and nonfatal conditions, changes the channel state toinvalid, and the interrupt state to either no interrupt pending orwaiting for read interrupt queue (if the channel is on an interruptqueue). The command is processed regardless of the current channelstate.

A channel changes state asynchronously with the command causing thechange. Software uses the select channel and test channel commands todetermine when the change actually takes place. The select channelcommand identifies a single channel while the test channel commandindicates its current state. Subsequent tests use additional selectchannel commands only if the channel number changes.

Read/Write LMT

Server software has the ability to modify the Local Mapping Table. Tohelp software or hardware debug, it also has the ability to examine thetable contents. The access is preferably made through the node's addresstranslation logic and page tables to insure that only authorizedsoftware modifies the facility. Untrusted code is never be givenauthority to modify it. The service processor preferably also hasunconditional access to the facility during system initialization andcheckstop recovery procedures. In preferred embodiments of the presentinvention, the Local mapping table is implemented as a portion of an 8megabyte hardware Static Random Access Memory (SRAM; see FIG. 19). Halfof this SRAM is allocated to the Local mapping table function while theremaining half is used for implementation specific purposes such asadapter microcode, trace tables, internal data tables, and scratch padwork areas. Server software accesses all SRAM locations, including theLocal mapping table, through the use of four 8 byte non-cachableinstructions referencing two special address values. All accesses to theSRAM involve two steps. First the address within the SRAM isestablished, and second, data is transferred between the server andSRAM. The address is defined initially, by a software to write to theSRAM address register. It then issues a load or store instructiontransferring data from or to the specified SRAM location. The hardwareincrements the value in the address register following every dataaccess. Software then either uses this value to access the nextsequential SRAM location or repeats the entire two step process.

Software does not access the Local mapping table entry of a channelunless the channel is in the invalid state (although the translationtable origin or maximum offset field may also be modified while in thestopped state). Software uses the privileged control commands identifiedabove to change the channel's state. Although software updates the Localmapping table while a channel is in the invalid state it is not allowedto modify the current state information within the channel state field.This means that, in the currently designed implementation, when writingdouble word 31 it sets bits 9-11 to “000.”

Read/Write Interrupt Status

Each adapter maintains an Interrupt Status Register, ISR, for eachinterrupt level supported. This register includes one bit for eachfunction that generates an interrupt including at least one allocated tothe message passing function. Server software has the ability to examineand reset the interrupt status for any interrupt level it uses. Theaccess is preferably made through addressing page tables to insure thatonly authorized software reads and/or modifies the facility. User levelcode is never given access. The service processor also preferably hasunconditional access to the facility during system initialization andduring checkstop recovery procedures.

Sixteen interrupt levels are supported in the current embodiments of thepresent invention. However, this number is a design choice and is notcritical to the operation or structure of the present invention in itsmost general aspects. Preferably, the hypervisor assign one interruptlevel to each one of up to sixteen logical partitions (LPARS) andprovides page tables giving each partition's operating system access toit's allocated ISR. Each ISR is accessed by server software referencinga special memory address. It reads an ISR using a non-cachable 8 byteload instruction or modifies an ISR using a non-cachable 8 byte storeinstruction. Software follows a write interrupt status command with aread interrupt status command to insure that the ISR modification hascompleted. The structure of the preferred Interrupt Status Register(ISR) is shown below in Table 7: TABLE 7 Interrupt Status Register BitFunction Description 0 enable controlled by server software to interruptenable or suppress all interrupts on this level - a processor interruptis generated if this bit and any bit 1-6 is active 1-2 reserved not used3 service set by hardware when the service buffer buffer functionrequests an function interrupt - reset by software - interrupt see theimplementation specification for information about this non messagepassing function 4 reserved not used 5 message set by hardware when themessage passing passing function requests an function interrupt - causedby detection of interrupt either a fatal or nonfatal message passingcondition or because a change occurred to message passing availability(bit 13) for which software requested an interrupt (bits 14-15) 6service set by service processor software processor to request a serverinterrupt - to server reset by server software - this bit interrupt isprovided for a possible but as yet unidentified need for the serviceprocessor to communicate to server software  7-11 status these bits areneither controlled nor used by the hardware - they may be used, alongwith bit 6 to pass, as yet unidentified, information from serviceprocessor software to server software 12 messaging set by hardware whenit detects a failure messaging failure condition - reset by detectedsoftware - it informs server software that a messaging failure hasoccurred, it does not directly cause an interrupt - when the hardwaresets this bit it also resets the message passing available bit, whichmay cause an interrupt 13 message set by the adapter or serviceprocessor passing to indicate that message passing is or available isnot available - server software has no control over this bit - hardwarediscards any user command or write LMT command and returns all ones to aread interrupt queue command received while this bit is inactive 14interrupt on set by software if it wants an interrupt messaginggenerated when the message passing available function becomes available(set bit 5 when bit 13 changes to 1) 15 interrupt on set by software ifit wants an interrupt messaging generated when the message passingunavailable function becomes unavailable (set bit 5 when bit 13 changesto 0) 16-63 undefined field is ignored by the hardware during a storeinstruction and returned as all zeros during a load instructionRead Interrupt Queue

There is one interrupt queue for each interrupt level supported by theadapter. The entries in a queue identify the channels that haverequested processor interrupts for that level. The queues are physicallyimplemented as linked lists of Local mapping table entries. A channelappears only in the queue specified by the channel's Logical MappingTable interrupt control field and it appears no more than once in thatqueue. Each queue is accessed by server software referencing a specialmemory address with a non-cachable 8 byte load instruction. Software isnot allowed to issue a store instruction to this address.

Server software has the ability to examine and extract information fromthe interrupt queue for any interrupt level it uses. The access ispreferably made through the node's address translation logic and pagetables to insure that only authorized software can read and thus modifythe facility. Application code is never given access. Operating systemcode is given access even in a logical partition (LPAR) environment. Itis not required that the service processor have access.

Each 8 byte load operation removes the oldest entry from the selectedqueue. It returns to software the channel number having an activeinterrupt plus information from the Local mapping table channel statusfield for that channel. If it determines that the queue is empty, itreturns a value of “1” in the most significant bit and resets theInterrupt Status Register message passing bit that caused the adapter torequest a processor interrupt. If message passing is not available, thecommand returns an all one's value. The command does not remove thechannel condition causing the interrupt nor does it enable that channelto generate a subsequent interrupt. Software issues a clear conditionuser command or reset channel and write LMT privileged commands beforethat channel may invoke a subsequent interrupt. Because a read interruptqueue command is required to remove a channel from an interrupt queue,it is possible that a channel remains on a queue after being closed withthe reset channel command or even after being reassigned with the openchannel command. A read interrupt queue command issued to such a channelreturns an indication that the channel has neither a fatal or nonfatalcondition. TABLE 8 64 Bit Data Field Bit Description 0 0 queue is notempty and message passing is available 1 queue is empty or messagepassing is not available 1 0 a nonfatal condition has not been detectedand message passing is available 1 nonfatal condition detected ormessage passing is not available 2 0 message passing is available 1message passing is not available - all 64 bits are “1” 3 0 interruptsare enabled for this channel and message passing is available 1interrupts are disabled for this channel or message passing is notavailable 4-5 current interrupt state 00 no interrupt pending and notwaiting for clear condition command 01 channel on interrupt queuewaiting for read interrupt queue command 10 processed read interruptqueue, waiting for clear condition, no pending interrupt 11 processedread interrupt queue, waiting for clear condition, have pendinginterrupt 6-8 unused  9-11 current channel state 000 invalid 001 valid010 stopping 011 stopped 100 resetting 12-15 0000 no fatal conditiondetected 0100 fatal failed to start condition detected 0101 fatal failedto complete condition detected 0110 fatal channel failure conditiondetected 0111 fatal stopped condition detected 16-31 channel numberinvoking interrupt 32-63 unusedRead TOD

This command is not actually necessary for message processing. It has,however, traditionally been provided as function available toapplication software by previous RS/6000 SP message passing systems andis therefore included here for completeness. Each adapter includes aregister that is incremented approximately once each 13.3 nanoseconds(ns) and is used to time stamp packets. The preferred embodiment hereinincludes a mechanism to maintain all copies of the register throughoutthe system to a common value within approximately,350 nanoseconds. It iscalled a ‘time of day’ register or TOD. Server software may choose touse the register contents as a common system wide time reference. Theread TOD function returns a 64 bit value. The low order 63 bits reflectthe value of the time of day register while the most significant bit,when set, indicates that the value is within the acceptable tolerance.

The register is accessed by server software referencing a special memoryaddress using a non-cacheable 8 byte load instruction. Each adapterincludes a single 4K area software may use to reference the TOD valuewithin that adapter. The 4K area is not used for any other type ofaccess. All adapters maintain the same TOD value. Page table entries arecreated giving untrusted application code read only non-cacheable accessto the TOD. Software is not allowed to issue a store instruction to thisaddress. Application level software may be given access to this functionif desired. TABLE 9 64 bit data field Bit Function Description 0 validActive if the adapter has successfully maintained the time value withinan acceptable tolerance to the same value maintained by other adaptersin the system - the definition of “acceptable tolerance” is establishedby the service processor during adapter initialization. 1-63 time valueField is initialized during adapter initialized and incremented onceapproximately every 13.3 ns.Read Physical ID Register

Each adapter includes one 16 bit physical ID register. It uniquelyidentifies that adapter within the system and is used to detectmisrouted packets. This register is defined by the service networkduring adapter initialization. All packets include a field specifyingthe physical ID value of the intended receiver. Packets received by anadapter allocated a different physical ID value are discarded. A valueof all one's represents a universal ID. An adapter with this physical IDvalue accepts all packets. A packet with this target ID value isaccepted by all adapters.

The physical ID value is examined or modified by privileged serversoftware referencing a special memory address with a non-cacheable 8byte load instruction. A convention is used of creating a physical IDvalue from a combination of a logical ID value along with a networkvalue. TABLE 10 64 Bit Data Field Bit description 0-3 The network numberthat the adapter is connected to. All adapters on the same network maycommunicate. Adapters on different networks may not communicate.  4-15Logical ID value assigned to this adapter throughout the network. 16-63Unused by hardware and presented as zeros during load instructionRead/Write Configuration

There are several facilities that are initialized before starting anymessage passing activity. The initialization is normally be performedfrom the service processor. It is not necessary for server software tobe given access but it may be useful during engineering debug activity.The service processor should, however, have the ability to preventmodifying these facilities from server software.

Each adapter includes a path table, a route table and a set of broadcastregisters. These facilities provide information about all remoteadapters with which the local adapter can communicate. This includes theremote adapter's physical ID value, the logical ID value used by thatadapter to reference the local adapter, and information about howpackets reach the remote adapter. See below for details. Thesefacilities are initialized by service processor software before theadapter is used.

Each adapter knows the real address values designating that adapter'suser command space and privileged command space. These parameters definethe address range associated with user commands and privileged commands.

Adapters also have several facilities clearly outside of the scope of amessage passing architecture but desirable for its development and/ormaintenance. This includes facilities used to report and identify thecause of hardware failures, to control or report the status of links, tohelp identify performance characteristics or to help debug softwarecontrolling the adapter or to debug the hardware itself.

Table Formats Local Mapping Table

The Local Mapping Table, LMT, is an array within adapter hardware usedto define channels. Each channel references one LMT entry containing 256bytes. This entry contains information which is of interest to serversoftware plus other implementation specific information that is not ofinterest to server software. Each entry holds all the privileged controlinformation that is established by trusted code plus all of the statusinformation associated with the channel. The table is initialized duringthe adapter reset sequence such that all channels are marked “invalid.”When a channel is allocated, software updates the first four doublewords of the channel's LMT entry and then issues the open channelcommand. Software later issues a reset channel command to deactivate it.The reserved areas are defined and used by the hardware as a work areaor scratchpad while processing messages for the channel the channel.Although privileged software can read anything in the table, thereserved areas are not normally of interest.

Software initiates a data transfer by issuing the start message usercommand. Hardware then schedules work by adding the indicated channel toone of two work queues. These queues keep track of all the channelsready for some kind of send processing. Software is given theperspective that there may be many active channels each with manypackets in flight simultaneously. Although the hardware does pipelineprocessing and does juggle many steps simultaneously, it really cannotdo everything in parallel. It sends a packet for one channel then doeswork on another channel and later comes back to the first channel formore processing. Software has no control over which channel gets thehardware's immediate attention other then by selecting which of the twowork queues the channel gets placed into. These work queues arepreferably stored in the Local Mapping Table and more particularly, arestored in what are described as reserved areas in FIG. 17. When hardwareis looking for additional work it switches between the two queues beforesearching deeper into a single queue. Hardware does multiplex itsattention over all channels on the two queues, thus preventing anysingle channel from dominating hardware resources. The queue to be usedby each channel is indicated in the LMT entry for that channel. See FIG.17. TABLE 11 Non-reserved LMT Fields Field Bits Significance mode bits16 0-2 Reserved 3 Work queue used by channel 0 use queue A 1 use queue B4 Transmission mode used during source of push 0 Reliable delivery orreliable acceptance 1 Unreliable 5 Type of reliable transmission modeused during push or pull 0 Reliable delivery 1 Reliable acceptance(ignored by the adapters herein) 6 Enable operation as remote read slave0 The channel can not be used as a remote read slave 1 The channel maybe used as a remote read slave 7 Enable operation as remote write slave0 The channel can not be used as a remote write slave 1 The channel maybe used as a remote write slave 8 Reserved  9-10 Size of descriptor listand data buffer pages: 00 no address translation, descriptor containsreal address value 01 4K page size 10 16 M page size 11 Reserved 11-12Number of address translation levels used 00 1 level 01 2 levels 10 3levels 11 4 levels - 4K page size required 13-14 Channel group 00Channel is not part of a channel group (the linked channel field is notvalid) 01 Anchor channel for a channel group (the linked channel fieldis valid) 10 Part of a channel group but neither anchor nor last (thelinked channel field is valid) 11 Last channel in a channel group (thelinked channel field is not valid) 15 Reserved channel 16 Providesstatus information about the channel. This field is managed by statusthe adapter and is not be directly written by software. 0 Reserved 1 Setby hardware if a nonfatal condition permitted by interrupt control bit 0is detected. Software resets the bit using the clear condition command.2 Reserved 3 Set if user has temporarily suppressed local processorinterrupts for nonfatal conditions. The bit is controlled by the enableinterrupt and suppress interrupt user commands. It does not suppressinterrupts due to fatal conditions. 4-5 Interrupt state 00 No interruptpending and not waiting for clear condition command 01 Channel oninterrupt queue waiting for read interrupt queue command 10 Processedread interrupt queue, waiting for clear condition, no pending interrupt11 Processed read interrupt queue, waiting for clear condition, havepending interrupt 6-8 Reserved  9-11 Identifies the current channelstate 000 invalid - the channel ignores any user command and discardsany incoming packet plus returns a nonfatal channel unavailablecondition to a request packet - this is the only state from whichsoftware should normally issue the read LMT or write LMT commands - achannel that is part of a channel group but in the invalid stateforwards an incoming packet targeted to the group to the next channelwithin the group for processing 001 valid - user commands and packettransfers are allowed 010 stopping - hardware has received theprivileged command stop channel and is finishing activity - entersstopped state when activity is completed 011 stopped - does not initiateany outgoing request or unreliable packets - incoming packets arediscarded plus it returns a fatal channel stopped condition to a requestpacket - while in this state software may issue the read LMT command orupdate select fields with the write LMT command 100 resetting - hardwarehas received the privileged command reset channel and is finishingactivity - it enters the invalid state when activity is completed 12-15Set by hardware if a fatal condition is detected. A processor interruptis generated and the channel placed in an interrupt queue if this fieldis non-zero and bit 0 is inactive. Software uses the write LMT commandto reset this field. The field holds the completion code identifying thetype of condition encountered. While this field is non-zero, thehardware does not initiate any outgoing packet, discards any startmessage command and discards any incoming request packet returning achannel unavailable condition to the sender. See elsewhere for adescription of individual fatal conditions. interrupt 12 This fieldcontrols the generation of processor interrupts. control 0 Set to enablelocal processor interrupts for nonfatal conditions 1-3 Reserved  4-11Establishes the interrupt level used by this channel user key 32 Set bysoftware to indicate the channel's user key value. All Message Passingoperations have identical user key values in both the sending andreceiving sides or one of the two fields has a universal key value ofall ones. The sending side includes its user key value in all outgoingpackets. The receiving side discards any packet received with anincorrect key value and returns to the sender an indication that thishas happened. There is no indication recorded in the receiving side thatthis has happened. The sending side records a channel unavailablecondition. descriptor 48 Software uses this field to define the initialdescriptor byte offset within offset the Message Passing address spacefor this channel prior to the first start message command issued to thechannel. Hardware updates the field as it processes the descriptor list.When hardware completes its processing, the field points to thedescriptor with an end of list condition. Note: Hardware may maintain acached version of this field while processing a descriptor list andmight not update the LMT contents until processing has completed. Note:The four least significant bits of this field are 0000. translation 52The most significant real address bits of the first address translationtable origin table to be accessed. The remaining 12 bits of the tableorigin is zero. linked 16 If the channel group mode field bits are 01 or10 this field identifies channel the next channel in a linked list ofchannels comprising a channel group. The field is ignored if the bitsare 00 or 11. maximum 36 Indicates the largest offset value allowedwithin a descriptor. It is given offset in units of 4K bytes. DS 4 ThisDescriptor Sequence field is used to match incoming response packetswith outgoing request packets. The field is set to 0 when the adapter isinitialized and is incremented by the adapter when the first requestpacket for an operation is generated. All request packets include theincremented sequence value as do all of the associated response packets.Reserved fields record the logical ID, remote channel, and descriptorsequence values of all expected responses. Any response received with avalue not expected is discarded. Software does not modify this field.

The hardware manages two work queues and one interrupt queue perinterrupt level. The channel number of the first channel in a queue issaved in a hardware register. The LMT entry associated with that channelincludes a reserved field identifying the next channel in the queue. Inthe presently preferred design, a channel is contained in at most twoqueues, a work queue and an interrupt queue.

The detailed contents of the areas marked “reserved” are dependent onthe particular implementation. It is not useful to server software andits detailed definition is therefore not included in the architecture.However, there are certain functions performed by fields in thissection. These functions include:

-   -   1. maintenance of the work queue linked list and the interrupt        queue linked list;    -   2. a time out mechanism for reception of a response packet;    -   3. record cached version of real address of descriptor and data        buffer along with cached translation table entries;    -   4. record current offset in data buffer (source/target of        push/pull, master of remote read/write);    -   5. record current count of number of bytes received from a        remote server (target of push/pull);    -   6. record additional number of bytes in data buffer to send        (source of push/pull, master of remote write, slave of remote        read);    -   7. record additional space available in data buffer for receive        (target of push/pull);    -   8. record remote adapter ID and channel (target of push, source        of pull, remote read slave);    -   9. record all logical ID, channel, and descriptor sequence        values needing a response maintenance of number of bytes        requested from remote server (remote read slave);    -   10. maintenance of number of bytes requested from remote server        (remote read slave)    -   11. record the number of unprocessed step message commands        received maintenance of the pull, descriptor and data sequence        numbers;    -   12. maintenance of the pull, descriptor and data sequence        numbers.

Address Translation Table

For a depiction of the layout format for a Translation Control Element(TCE) field entry see FIG. 18 and Table 12 below: TABLE 12 Field BitsSignificance page 52 This field, in a level 1 TCE, provides the mostsignificant pointer bits of the translated real addresses. The field, ina level 2, 3 or 4 TCE provides the most significant bits of the next TCEtable in the translation process. The entire field is used whenaccessing 4K pages. Only the most significant 40 bits are used whenaccessing 16 M pages. Unused bits should be set to zero by software.flags 12 The following flags bits are defined: (if no bit is set thenthe entry is not valid) 0 set if the page may contain descriptors 1 setif the page may source data transfers 2 set if the page may sink datatransfers 3-11 reserved Note: this field is only used in a level 1 TCE.

The address translation table resides in the node's memory and is usedby the message passing hardware to translate a virtual address or bufferoffset contained within the LMT or descriptor list into a real addressvalue. An entry in this table is referred to as a TCE or TranslationControl Element. The table is used to reference memory allocated in pagesizes of 4K or 1 6M bytes. The table itself is contained in 4K bytepages. The same general format with 8 byte entries is used for level 1,2, 3, and 4 tables. However the flags field is only used in level 1.

Software setting up the translation table sets individual flag bits torestrict the type of access permitted to the page or may enable any oftype access by setting multiple bits.

There are some situations where it is permissible and desirable todirectly use real address values in the LMT and descriptor list. A modesetting in the LMT enables such behavior. When set, it indicates thatthe channel is under control of an application capable of generatingreal address values and that the translation table should not be used.The memory protection functions provided by the table, including the TCEflags field, are obviously not available in this mode.

Hardware caches translation table entries while controlling a channel.Software modifies the address table only if that channel is in theinvalid or stopped state. Software uses the privileged control commandsidentified above to change the channel's state.

Address translation can fail, resulting in a fatal failed to start orfailed to complete condition, because:

-   -   1. a descriptor offset value is greater than what's allowed in        the LMT;    -   2. a buffer offset value is greater than what's allowed in the        LMT;    -   3. fetching a descriptor but the TCE prohibits descriptors;    -   4. fetching data but the TCE prohibits fetching data;    -   5. storing data but the TCE prohibits storing data;    -   6. a descriptor is not placed on an 16 byte address boundary; or    -   7. a descriptor straddles a page boundary.

Descriptor List

Most channels point to a list of descriptors defined by software andsequentially processed by the hardware. Descriptors provide detailedinformation about how data buffers in local memory are organized and howinformation is transferred between servers. Individual descriptorspreferably start on a 16 byte memory boundary, use 16 or 32 bytes ofmemory and do not straddle a page boundary. The present sectiondescribes each type of descriptor as identified by a unique four bitcode in the descriptor's type field. See the table below: TABLE 13Descriptor Code Function remote write 0010 control remote read/writeremote read 0011 operations preload data 1000 identify buffers involvedin source of push 0100 push operation target of push 0101 source of pull0110 identify buffers involved in pull target of pull 0111 operationbranch 0001 manage descriptor list

All operations require channels to be defined in both of the adaptersinvolved in a data transfer. Descriptor lists are defined for eachchannel involved in a push or pull operation or when the master channelcontrols a remote read/write operation. Channel activity starts eitherwhen software issues a start message command or when a packet isreceived referencing that channel. Once started, a channel continues tofetch and process individual descriptors until it either encounters anend of list condition, which is a non-“1111” condition code, or it iswaiting for data from another channel. If the descriptor cannot beprocessed, the channel suspends operations until a subsequent eventrestarts the channel. If a packet is received that cannot be processedby the local descriptor, then that packet is rejected, and if the packetused a reliable protocol an appropriate response is returned to theissuing channel. TABLE 14 Triggering Event Process local start ReceiveDescriptor message or finish Receive push/pull fetched previousdescriptor remote start data branch process descriptor processdescriptor process descriptor remote write process descriptor rejectpacket reject packet remote read process descriptor reject packet rejectpacket preload data process descriptor reject packet reject packetsource of push process descriptor reject packet reject packet target ofpush suspend channel reject packet process descriptor source of pullfunction of remote process descriptor reject packet start flag target ofpull function of remote reject packet process start flag descriptor

Hardware presents software with the perception that it processes adescriptor list strictly in the order presented by software. However,memory buffers serving as targets for data transfers may physically beupdated in any order. The hardware updates a given descriptor only afterall associated data stores are complete. The hardware also update asequence of descriptors only in the sequence established by software.The perception of in-order-processing requires that software examinetargeted data areas only after it is observed that the associateddescriptor processing is complete. Software looking directly at databuffers may view out-of-order activity. This actualout-of-order-processing is caused by hardware attempting to speed thingsup by starting new descriptors before the results of previous operationsare determined. The difference between perception and reality may becomevisible when fatal conditions occur. A fatal condition shuts down achannel and generates a processor interrupt; however, it is possiblethat the hardware has already started processing additional descriptorsbeyond the point of failure.

Hardware may cache LMT or memory information while processing a channel.Software insures that it doesn't modify a channel's LMT entry, TCEvalue, descriptor, or memory buffer while such caching is active. Thehardware purges its cache of descriptor information when it detects anend of list condition. Software does not modify the LMT entry using theprivileged LMT write command after it issues a start message or stepmessage command until hardware has completed all processing of thedescriptor list. It may not modify a descriptor entry until hardware hasset that descriptor's Completion Code field or has reported a fatalcondition preventing further processing of that channel. A descriptorwith a non-“1111” condition code field is used to end a descriptor list.This end of list condition is changed, using the procedure identifiedbelow, to add new descriptors to the list. Translation tables and/ormemory buffers are changed as soon as all descriptors that use them arecompleted.

The process for adding additional descriptors to an active list relieson the circumstance that the original list ends with an end of listcondition. Software maintains this condition until it constructs the newinformation being appended to the list. It then modifies the end of listcondition to a new descriptor type and/or condition code field. If thischannel is controlling the transfer, meaning the list contains a sourceof push, target of pull, remote read, or remote write type descriptor,then software preferably issues another start message command to insurethat the hardware recognizes the modification.

All descriptors share a common set of field definitions, although notall fields or bit definitions are used by all descriptor types. TheCompletion Code field is of special interest. It is used with alldescriptors that are involved in data exchanges. When softwareconstructs a descriptor, it sets this four bit field to “1111.” Hardwarethen changes the field to another value when it completes processing thedescriptor. A code of “1111” indicates that the operation has not yetcompleted and a code of “0000” indicates that it did completesuccessfully. The remaining codes indicate some level of exceptioncondition with the severity generally increasing as the code point valueincreases. See below for an indication of the failures that set eachcode. Nonfatal conditions set the code in the descriptor completion codefield. Fatal error conditions set the code in the channel's LMT channelstatus field. TABLE 15 Set in LMT Set in channel Code Condition Severitydescriptor status 1111 not finished none yes no 0000 completed nonfatalyes no 0001 insufficient nonfatal yes no space 0010 channel nonfatal yesno unavailable 0011 connection nonfatal yes no failure 0100 failed tostart fatal no yes 0101 failed to fatal no yes complete 0110 channelfailure fatal no yes 0111 channel stopped fatal no yes

The flag field associated with most descriptors includes bits defined bysoftware to control the marking function and/or indicting when aprocessor interrupt should be generated. The field also includes statusinformation established by hardware when the descriptor operationcompletes. Software is required to initialize these bits to a “0” value.The hardware does not verify this and may produce incorrect statusinformation if software doesn't correctly initialize them.

Most descriptors include a byte count field established by software.Software should not set this field to a zero value. If it does, thehardware is designed to report a fatal failed to start or failed tocomplete condition if it detects a zero byte count value in an otherwiseacceptable descriptor. It also reports a fatal failed to start or failedto complete condition if the LMT mode field indicates that the channelis restricted to a single packet per descriptor and the byte count fieldcontains a value greater than 2,048.

Many descriptor types include fields labeled unused or reserved. Thepresent adapter does not check, use or modify a field labeled unused. Inthe presently preferred implementation, the adapter assumes that a fieldlabeled reserved is set by software to a zero value. The adapterdescribed herein is not required to verify that reserved fields arecorrectly initialized and may not operate as expected if they are notcorrectly initialized. TABLE 16 Remote write Field Bits Significancetype 4 Always set to 0010 by software for a remote write type ofdescriptor. CC 4 This Completion Code field is set to 1111 by softwareand modified by the hardware when it finishes using the descriptor. Thedefined codes are: 1111 the hardware has not finished processing thedescriptor 0000 the hardware has completed processing the descriptor anddid not detect any special condition 0010 the operation failed becauseof a nonfatal channel unavailable condition - the remote channel wasmarked invalid, did not have the correct user key value, or was in afatal error state - the remote channel has not been affected by thisfailure - local processing continues with the next descriptor 0011 theoperation failed because of a nonfatal connection failure condition -the hardware was unable to communicate with the remote adapter - thestatus of the remote adapter is unknown - local processing continue withthe next descriptor flags 8 The following flags bits are defined: 0reserved 1 set by software to interrupt the local server after theoperation completes 2-7 reserved local 48 Set by software to indicatethe byte data offset within the local channel's offset address space ofthe area to obtain data. The hardware uses the translation tableassociated with the local channel to translate this value to a realmemory address value. target 16 Set by software to indicate the channelchannel number in the remote server that defines the message passingaddress space within that server. target 12 Set by software to thelogical ID of ID the remote adapter targeted to receive the data. byte36 The number of data bytes to be count transferred. The field may notcontain a zero value. remote 48 Set by software to indicate the bytedata offset within the remote channel's offset address space where datais placed. The hardware uses the translation table associated with theremote channel to translate this value to a real memory address valuewithin the remote server.

A remote write type of descriptor occupies 32 memory bytes and is usedby software to identify both the local memory buffer providing data forthe transfer and the remote memory area that is modified. The remoteadapter has a channel established that defines the address spaceavailable for the operation. The local remote write descriptor iscompleted when all of the data it provides is transmitted to the remoteadapter and a response is received indicating that the data wassuccessfully placed in memory or indicating the reason for failure. Thelocal descriptor completion code field, CC, is updated with the finalstatus of the operation. See Table 16 above.

The actual data transfer is initiated when software within the localserver issues a start message command or all previous descriptors on thelist have completed.

Remote Read

A remote read type of descriptor occupies 32 memory bytes and is used bysoftware to identify both the remote memory buffer providing data forthe transfer and the local memory area that is modified. The remoteadapter has a channel established that defines the address spaceavailable for the operation. When the local adapter has received all ofthe remote data and/or has completed it's processing, it updates thecompletion code field indicating if the transfer was successful.

Remote read operations involving multiple packets require the channelproviding the data be dedicated to that operation until it is completed.Any third party attempt to use the channel during this busy periodreports a fatal failed to start completion. A third party is defined tobe any request from a different adapter or from a different channel.This busy period starts from the time the targeted channel receives apacket requesting data to the point that the channel transmits the lastbyte of data requested.

The actual data transfer is initiated when software within the localserver issues a start message command or when all previous descriptorson the list have completed. TABLE 17 Field Bits Significance type 4Always set to 0011 by software for a remote read type of descriptor. CC4 This Completion Code field is set to 1111 by software and modified bythe hardware when it finishes using the descriptor. The defined codesare: 1111 The hardware has not finished processing the descriptor 0000The hardware has completed processing the descriptor and did not detectany special condition 0010 The operation failed because of a nonfatalchannel unavailable condition - the remote channel was marked invalid,did not have the correct user key value, or was in a fatal error state -the remote channel has not been affected by this failure - localprocessing continues with the next descriptor 0011 The operation failedbecause of a nonfatal connection failure condition - the hardware wasunable to communicate with the remote adapter - the status of the remoteadapter is unknown - local processing continue with the next descriptorflags 8 The following flags bits are defined: 0 Reserved 1 Set bysoftware to interrupt the local server after the operation completes 2-7Reserved local 48 Set by software to indicate the byte data offsetwithin the local channel's offset address space available to receivedata from the remote adapter. The hardware uses the translation tableassociated with the local channel to translate this value to a realmemory address. source 16 Set by software to indicate the channelchannel number in the remote server that defines the message passingaddress space within that server. source 12 Set by software to thelogical ID of ID the adapter that provides data for the transfer. byte36 The number of data bytes to be count transferred. The field may notcontain a zero value. remote 48 Set by software to indicate the bytedata offset within the remote channel's offset address space where datais obtained. The hardware uses the translation table associated with theremote channel to translate this value to a real memory address valuewithin the remote server.

TABLE 18 Source of push Field Bits Significance type 4 Always set to0100 by software for a source of push descriptor. CC 4 This CompletionCode field is set to 1111 by software and modified by the hardware whenit finishes using the descriptor. The defined codes are: 1111 Operationhas not finished 0000 Operation completed successfully 0001 Operationfailed due to a nonfatal insufficient space condition - the localdescriptor had more data than the remote adapter could process beforedetecting an end of list condition or a descriptor other than branch ortarget of push - the extra data is discarded with no indication of howmuch is discarded - local processing continues with the next descriptor(Note: data discarded because of receive side marking does not use thiscompletion code) *** 0010 The operation failed because of a nonfatalchannel unavailable condition; the remote channel is marked invalid,didn't have the correct user key value, or was in a fatal error state;this failure does not affect the remote channel; local processingcontinues with the next descriptor *** 0011 the operation failed becauseof a nonfatal connection failure condition; the hardware is unable tocommunicate with the remote adapter; the status of the remote adapter isunknown; local processing continues with the next descriptor ** flags 8The following flags bits are defined: 0 Reserved 1 Set by software tointerrupt the local server after the operation completes 2 Reserved 3Reserved 4 Set by software when the local buffer is marked. 5 Reserved 6Reserved 7 Set by hardware if receive side marking discarded data ***data 48 Set by software to indicate the byte offset offset within thischannel's address space of the data to be transmitted to the remoteadapter. The hardware uses the translation table associated with thischannel to translate this virtual offset value to a real memory addressvalue. target 16 Set by software to indicate the channel channel numberin the adapter targeted to receive the data. target 12 Set by softwareto indicate the ID logical ID of the adapter targeted to receive thedata. byte 36 Set by software to indicate the count number of bytes tobe transmitted to the target. The field may not contain a zero value.With respect to Table 18 above, the code point marked with “**” is notused with the unreliable transmission protocols (as indicated in thechannel's LMT mode field). Also, bits and/or code points marked with“***” are not used with the unreliable or the reliable deliverytransmission protocols (also as indicated in the channel's LMT modefield).

A source of push descriptor occupies 16 bytes in memory and is used bysoftware to identify the local memory buffer providing data to betransmitted to a remote adapter during a push operation. The transfer isstarted when software within the local server issues a start messagecommand to the channel referencing this descriptor. The descriptoridentifies the remote adapter and channel number that receive the data.That channel contains one or more target of push type descriptors. Thelocal source of push descriptor is completed when all of the data itprovides is transmitted to the remote adapter and, if using the reliableacceptance mode, a response is received from the remote adapter. At thispoint, the local descriptor completion code field, CC, is updated withan indication that the data was successfully placed in the target'smemory or identifies the reason for failure.

A source of push descriptor is preferably used only with a remoteadapter processing a target of push type descriptor. The entire pushoperation may use multiple descriptors in either or both sides of thetransfer. It is not necessary that both sides use the same number ofdescriptors. Send side marking is used to transfer less data to thetarget than is specified in the target of push descriptor. Receive sidemarking is used by the remote server to limit the amount of data thetarget of push descriptor accepts. There is no indication recorded ineither side's descriptor of how much data is discarded, if any, due toreceive side marking.

It is not necessary that all source of push descriptors for a givenchannel identify the same target. Each descriptor sends data to adifferent adapter or different channel.

Setting the local buffer is marked flag bit invokes the send sidemarking function. This causes the target of push descriptor to becompleted as soon as it updates memory with the last data byteassociated with the source of push descriptor regardless of the amountof additional buffer space available.

The actual data transfer is initiated when software within the localserver issues a start message command or when the processing of allprevious descriptors on the list is completed. The hardware typicallystarts sending data for a subsequent descriptor before receiving aresponse to data already sent. The hardware updates the completion codefields associated with sequential descriptors in the order softwarecreated the list.

A source of push descriptor uses any type of transmission reliability.The type selected is indicated by the channel's LMT mode field. Whenusing unreliable transmissions, the descriptor is marked completed assoon as all the data it provides is transmitted. When using the reliabledelivery mode, the descriptor is marked completed only after receivingan echo packet from the targeted adapter for every data packet sent bythe source of push. When using the reliable acceptance mode, thedescriptor is marked completed only after receiving an echo packet fromthe targeted adapter for every data packet sent and after receiving aresponse packet indicated that the target has updated memory. See abovefor information related to reliability modes, as described herein. Thetype of reliability used also influences which condition codes and flagbits are set by the hardware.

When a channel uses the unreliable mode, software may invoke thebroadcast function by setting the target ID to the special broadcast IDvalue of all one's. This causes the operation to be sent to all remoteadapters directly attached to the switch. See above for informationabout broadcast operations. TABLE 19 Target of push Field BitsSignificance type 4 Always set to 0101 by software for a target of pushtype of descriptor. CC 4 This Completion Code field is set to 1111 bysoftware and modified by the hardware when it finishes using thedescriptor. The defined codes are: 1111 The operation has not finished.0000 The operation completed successfully. 0011 The operation failedbecause of a nonfatal connection failure condition; the hardware wasunable to communicate with the remote adapter; this may be the result ofnot being able to send a response back to the source when necessary ornot receiving the next packet of a multi-packet transfer within areasonable time; the status of the remote adapter is unknown; localprocessing continues with the next descriptor. flags 8 The followingflags bits are defined: 0 Reserved 1 Set by software to interrupt thelocal server after the operation completes. 2 Reserved 3 Reserved 4 Setby software when the local buffer is marked 5 Reserved 6 Reserved 7 Setby hardware if receive side marking (bit 4 is active) discarded datadata 48 Set by software to indicate the offset byte offset within thischannel's address space of the area available to receive data fromanother adapter. The hardware uses the translation table associated withthis channel to translate this value to a real memory address. source 16Set by hardware to indicate the channel remote channel that initiatedthe transfer. If multiple channels are involved in providing data, onlythe last is recorded. source 12 Set by hardware to indicate the IDlogical ID of the remote adapter that initiated the transfer. Ifmultiple remote adapters are involved in providing data, only the lastis recorded. byte 36 Set by software to indicate the count number ofbytes available in the memory area referenced by the data pointer. Thefield does not contain a zero value. Hardware modifies the field afterthe transfer to indicate the actual amount of space used.

A target of push descriptor occupies 16 bytes in memory and is used bysoftware to identify the local memory buffer used to receive data duringa push operation initiated by a remote server. The transfer is startedwhen software within the remote server issues a start message command tothe channel having one or more source of push type descriptors. Thelocal target of push descriptor is completed when all of its bufferspace is used for incoming data or when the incoming data is marked. Atthis point, the local descriptor completion code field, CC, is updatedwith an indication that the data has been successfully placed in localmemory or identifies the reason for failure and the descriptor isupdated with an indication of the sending adapter's logical ID andchannel number.

A target of push descriptor is only used with a remote adapterprocessing a source of push type descriptor. The entire push operationmay use multiple descriptors in either or both sides of the transfer. Itis not necessary that both sides use the same number of descriptors.Send side marking may cause the target of push descriptor to becompleted without using all of the data area allocated by software.Hardware updates the byte count field with the number of bytes actuallyused. Receive side marking is used by the local server to limit theamount of data the target of push descriptor accepts. There is noindication recorded in either side's descriptor of how much data isdiscarded, if any, due to receive side marking.

Setting the local buffer is marked flag bit invokes the receive sidemarking function. After the space defined by the target of pushdescriptor is exhausted, the hardware discards any additional dataassociated from the active source of push descriptor. If data isdiscarded the receive side marking discarded data flag bit is set in thetarget of push descriptor, and if using the reliable acceptance mode, itis also set in the source of push descriptor.

Push operations involving multiple packets assume that the channelreceiving the data is dedicated to that operation until the push iscompleted. Any third party attempt to use the channel during this busyperiod is ignored with a fatal failed to start completion reported inthe third party descriptor if using the reliable acceptance mode. Athird party is defined to be any request from a different adapter or adifferent channel. This busy period starts from the time the channelreceives the first data packet provided by a source of push descriptorto the point all of the data provided by that descriptor is transferredand the target of push descriptor is updated. If the transfer does notuse all the space provided by the target of push descriptor, and sendside marking is not used, then the busy period is indefinitely extendeduntil some initiating channel does provide sufficient data or untilsoftware deallocates the target of push channel.

A target of push descriptor may use any type of transmissionreliability. If an unreliable packet is received, the hardware processesthe information without returning either an echo or a response packet.If a reliable request packet is received, the hardware returns an echoand, if the LMT mode field indicates usage of the reliable acceptanceprotocol, the hardware also generates a response packet after updatingmemory with all the information sent from the same source of pushdescriptor. Reliable transfers assume that both sides of the operationuse the same type of reliability. See above for relevant moreinformation pertaining to reliability modes.

A target of push descriptor in a channel using unreliable transmissionprotocols may receive a broadcast operation. The descriptor receiving abroadcast operation is updated by hardware in a manner similar to thatwhen processing non-broadcast unreliable operations except that thesource ID field is set to the special broadcast ID value of all ones.See above for relevant information pertaining to broadcast operations.TABLE 20 Source of pull Field Bits Significance type 4 Always set to0110 by software for a source of pull type of descriptor. CC 4 ThisCompletion Code field is set to 1111 by software and modified by thehardware when it finishes using the descriptor. The defined codes are:1111 operation has not finished 0000 operation completed successfully -data has been delivered to the target adapter 0001 Operation failed dueto a nonfatal insufficient space condition - the local descriptor hadmore data than the remote adapter could process before detecting an endof list condition or a descriptor other than branch or target of pull -the extra data is discarded with no indication of how much isdiscarded - local processing continues with the next descriptor (note:data discarded because of receive side marking does not use thiscompletion code) *** 0011 the operation failed because of a nonfatalconnection failure condition - the hardware was unable to communicatewith the remote adapter - the status of the remote adapter is unknown -local processing continue with the next descriptor flags 8 The followingflags bits are defined: 0 reserved 1 set by software to interrupt thelocal server after the operation completes 2 set by software if a remotestart packet is required to start descriptor processing 3 reserved 4 setby software when the local buffer is marked. 5 reserved 6 reserved 7 setby hardware if receive side marking discarded data *** data 48 Set bysoftware to indicate the byte offset offset within this channel'saddress space of the data to be transmitted to the remote adapter. Thehardware uses the translation table associated with this channel totranslate this value to a real memory address value. target 16 Set byhardware to indicate the channel remote channel that initiated the pulloperation. target 12 Set by hardware to the logical ID ID value of theadapter that initiated the pull operation. byte 36 The number of bytesin the local count memory buffer to be transmitted to the target. Thefield does not contain a zero value.the code point marked with *** is not used with the reliable deliverytransmission protocol

A source of pull type descriptor occupies 16 bytes in memory and is usedby software to identify the local memory buffer providing data requestedby a remote server initiating a pull transfer. The transfer is startedwhen software within the remote server issues a start message command toa channel having one or more target of pull type descriptors in whichthe first generates a remote start packet. The source of pull descriptoris completed when all of the buffer space associated with it has beensuccessfully delivered to the requesting adapter and, if using thereliable acceptance mode, a response is received from that adapter. Atthis point, the local descriptor completion code field, CC, is updatedwith the requesting adapter's logical ID and channel number.

A source of pull descriptor is only be used with a remote adapterprocessing a target of pull type descriptor. The entire pull operationmay use multiple descriptors in either or both sides of the transfer. Itis not necessary that both sides use the same number of descriptors.Send side marking may be used to transfer less data to the target thanspecified in the target of pull descriptor. Receive side marking may beused by the remote server to limit the target of pull descriptorhardware accepts. There is no indication recorded in either side'sdescriptor of how much data is discard, if any, due to receive sidemarking.

Setting the remote start flag bit prevents processing the descriptoruntil the remote start packet is received from the adapter initiatingthe operation. This enables software to add additional descriptors to anactive list but prevents hardware processing of the new descriptorsuntil software on the target side creates the target of pull descriptorsnecessary to receive the data. Software building the target of pulldescriptors sets an equivalent flag in the first target of pulldescriptor to generate the required remote start packet.

Setting either the local buffer is marked or the interrupt the remoteserver flag bit invokes the send side marking function. This causes thetarget of pull descriptor to be completed as soon as it updates memorywith the last data byte associated with the source of pull descriptorregardless of the amount of additional buffer space available.

Pull operations involving multiple packets assume that the channelproviding the data is dedicated to that operation until the pulloperation is completed. Any third party attempt to use the channelduring this busy period reports a fatal failed to start condition. Athird party is defined to be any request from a different adapter or adifferent channel. This busy period starts from the time the channelreceives a remote start packet to the point it detects an end of listcondition and updates all source of pull descriptors used during theoperation. A source of pull descriptor with an active remote start flagencountered after the initial source of pull descriptor is considered tobe the same as an end of list condition.

A source of pull descriptor uses either type of reliable transmission.The type selected is indicated by the channel's LMT mode field. Whenusing the reliable delivery mode, the descriptor is marked completedonly after receiving an echo packet from the targeted adapter for everydata packet sent by the source of pull. When using the reliableacceptance mode, the descriptor is marked completed only after receivingan echo packet from the targeted adapter for every data packet sent andafter receiving a response packet indicated that the target has updatedmemory. Both sides of the operation use the same type of reliability.See above for relevant information pertaining to broadcast operationsreliability modes. The type of reliability used also influences whichcondition codes and flag bits are set by the hardware.

Target of Pull

A target of pull descriptor occupies 16 bytes in memory and is used bysoftware to identify the local memory buffer used to receive data duringa pull operation initiated by the local server. The target of pulldescriptor identifies the remote adapter and channel number thatprovides the data. The transfer is started when software within thelocal server issues a start message command. The target of pulldescriptor is completed when all of its buffer space has been used forincoming data or the incoming data is marked. At this point, the localdescriptor completion code field, CC, is updated with an indication thatthe data is successfully placed in local memory or identifies the reasonfor failure. TABLE 21 Field Bits Significance type 4 Always set to 0111by software for a target of pull type of descriptor. CC 4 ThisCompletion Code field is set to 1111 by software and modified by thehardware when it finishes using the descriptor. The defined codes are:1111 operation has not finished 0000 operation completed successfully0010 the remote start portion of the operation failed because of anonfatal channel unavailable condition - the remote channel was markedinvalid, did not have the correct user key value, or was in a fatalerror state - the remote channel has not been affected by this failure -local processing continues with the next descriptor *** 0011 theoperation failed because of a nonfatal connection failure condition -the hardware was unable to communicate with the remote adapter - thismay be the result of not being able to send a response back to thesource when necessary or not receiving the next packet of a multi-packettransfer within a reasonable time - the status of the remote adapter isunknown - local processing continues with the next descriptor flags 8The following flags bits are defined: 0 reserved 1 set by software tointerrupt the local server after the operation completes 2 reserved 3set by software if a remote start packet is generated when processingstarts 4 set by software when the local buffer is marked 5 reserved 6reserved 7 set by hardware if receive side marking (bit 4 is active)discarded data data 48 Set by software to indicate the offset byteoffset within this channel's address space of the buffer area availableto receive data from another adapter. The hardware uses the translationtable associated with this channel to translate this value to a realmemory address. source 16 Set by software to indicate the channelchannel number providing data for the transfer. source 12 Set bysoftware to indicate the ID logical ID of the adapter providing data forthe transfer. byte 36 The number of bytes in the memory count areareferenced by the data pointer. It is set by software to indicate howmuch space is available. The field may not contain a zero value.Hardware modifies the field after the transfer to indicate the actualamount of space used.(In the table above, the code point marked with *** is not used with thereliable delivery transmission protocol.)

A target of pull descriptor is only be used with a remote adapterprocessing a source of pull type descriptor. The entire pull operationuses multiple descriptors in either or both sides of the transfer. It isnot necessary that both sides use the same number of descriptors. Sendside marking can cause the target of pull descriptor to be completedwithout using all of the data area allocated by software. Hardwareupdates the byte count field with the number of bytes actually used.Receive side marking is also used by the local server to limit theamount of data the target of pull descriptor accepts. There is noindication recorded in either side's descriptor of how much data isdiscarded, if any, due to receive side marking.

Setting the remote start flag bit causes the adapter to send a remotestart packet to the channel containing the source of pull descriptorbefore waiting for that channel to subsequently provide data. The firstdescriptor in the list has the remote start bit set as should the firstdescriptor of any new set of descriptors added to the list while thechannel is active. Failure to set this bit causes channel activity to besuspended without starting the pull operation. A remote start issued toa channel that cannot find a source of pull descriptor results in afatal failed to start condition being reported in the target channel.

Setting the local buffer is marked flag bit invokes the receive sidemarking function. After the space defined by the target of pulldescriptor is exhausted, the hardware discards any additional dataassociated from the active source of pull descriptor. If data isdiscarded the receive side marking discarded data flag bit is set in thetarget of pull descriptor, and if using the reliable acceptance mode inthe source of pull descriptor.

Pull operations involving multiple packets require that the channelreceiving the data be dedicated to that operation until the pull iscompleted. Any third party attempt to use the channel during this busyperiod reports a fatal failed to start completion. A third party isdefined to be any request from a different adapter or a differentchannel. This busy period starts from the time the channel either issuesa remote start packet or receives the first data packet provided by asource of push descriptor to the point all of the data provided by thatdescriptor is transferred and the target of pull descriptor is updated.If the transfer does not use all the space provided by the target ofpull descriptor, and send side marking is not used, then the busy periodis extended indefinitely until some initiating channel does providesufficient data or until software deallocates the target of pullchannel.

A target of pull descriptor uses either type of reliable transmission.The type selected is indicated by the channel's Local mapping table modefield. Both sides of the transfer use the same mode. For eitherreliability mode, an echo is returned for each packet received. If thereliable acceptance mode is used, a response packet is generated afterprocessing all packets associated with the same source of pulldescriptor and a response packet is generated if a remote start packetcannot be processed. See above for information relevant to reliabilitymodes. TABLE 22 Preload data Field Bits Significance type 4 Always setto 1000 by software for a preload data type of descriptor byte 36 Set bysoftware to indicate the number of bytes to count be transmitted to thetarget. data 48 Set by software to indicate the byte offset withinoffset this channel's address space of the data to be transmitted to theremote adapter. The hardware uses the translation table associated withthis channel to translate this virtual offset value to a real memoryaddress value.

A preload data type of descriptor uses 16 memory bytes and is used toidentify one of two disjoint memory segments that is to be transmittedto a remote adapter as a single packet. The descriptor is followed by asource of push descriptor that identifies both the last region to betransmitted and the normal condition code, flags, target channel andtarget ID fields. In the presently preferred implementation, up to twobranch descriptors may be placed between the preload data and source ofpush descriptors.

The combination of preload data and source of push descriptors isintended to be used when the target channel is shared by multiplesources and it is desired that the data be gathered from two separatememory regions. Constraints which are imposed on software when sharing areceive channel, one of which is that software understands and controlshow individual packets are constructed, are described below. A singlepacket does not include data from multiple source of push descriptors.However, it can be constructed from a preload data descriptor followedby a source of push descriptor if the total amount of data specifieddoes not exceed 2,048 bytes. The packet may use either the reliable orunreliable transmission protocol and if unreliable may use the broadcastfunction if desired. This combination can be thought of as effectively asingle descriptor capable of gathering data from multiple regions ofmemory and producing a single message passing packet.

A fatal failed to start condition is reported if the preload datadescriptor references more than 2,047 data bytes or if a source of pushdescriptor is not found after the preload data or if the combination ofpreload data and source of push reference more than 2,048 bytes whenusing unreliable transmission protocols. TABLE 23 Branch Field BitsSignificance type 4 Always set to 0001 by software for a branch typedescriptor descriptor 48 Set by software to indicate the byte offsetwithin offset the message passing address space of the next descriptorelement. The hardware uses the translation table associated with thischannel to translate this virtual offset value to a real memory addressvalue. Note: the 4 least significant bits of this field are 0000.

A branch uses 16 memory bytes and indicates an alternative address forthe next descriptor to be processed. After completing a givendescriptor, the hardware normally fetches the next descriptor from thevirtual memory address immediately following the one just completed. Abranch descriptor modifies this pattern. It indicates the offset withinthe channel's address space of the next descriptor. The presence of morethan two consecutive branch descriptors invokes a failed to startcondition. 24 Path Table Field Bits Significance flags 14 The followingflags bits are defined: 0-1 Current path A - last path used by areliable request packet (virtual lane 5) 2 Valid - any use of thislogical ID reports a failed to start condition unless this bit is “1” 3Unused 4-7 Identifies paths that are preferred  8-11 Identifies pathsthat have encountered a path failure 12-13 Current path B - last pathused by a reliable response packet (virtual lane 6) logical 12 Thelogical ID (path table entry) of ID this adapter in the target adapter.This field is included in all message passing packets sent to thetarget. It tells the receiving adapter the path back to this sendingadapter. It also identifies the send, receive and echo sequence numbersused to insure in-order packet delivery. The receiving adapter alsorecords this value in the descriptor associated with a target of pushoperation or a source of pull operation. Note: One embodiment of thepresent invention implements only 10 bits for this field forcing thehigh order 2 bits to ‘00’. Another embodiment of the present inventionalso only implements 10 bits of this field setting the high order 2 bitsto the value found in bits 4-5 of the physical ID register. physical 16The physical ID value assigned to the ID target adapter. Each adapter isassigned a system wide unique value by the service processor and servicenetwork. This field is included in all packets sent to the target fromthe local server. The receiver discards any incoming packet that doesnot have the correct physical ID value for that adapter.

Every adapter includes a path table containing one entry for everyremote adapter with which it communicates. This may be a subset of thetotal number of adapters in the system. The table records the status andcharacteristics associated with individual connections includinginformation about the four routes available for sending packets to agiven target. The table is indexed by a logical ID value obtained eitherfrom the target ID field within a local descriptor or from the sourcelogical ID field of a packet received from another adapter. The logicalID is a value from 0 to the maximum number of logical ID valuessupported by the adapter. A special logical ID value of all one'srepresents a broadcast ID used only during broadcast operations (seeabove). The broadcast operations do not use the path table (nor theroute table). They instead use the Broadcast Registers describedelsewhere herein.

The valid bit indicates if the there is information defined for thislogical ID value. Any operation referencing a logical ID value having avalid bit value of “0” reports a failed to start condition (see below).When possible, the adapter sends packets using a randomly selected pathamong the four paths provided. (The number of paths is a design choiceand does not constitute a critical aspect of the present invention.)This spreads work over several paths reducing fabric congestion andimproving overall performance. All unreliable packets are sent with arandomly chosen path. Reliable packets insure in-order delivery and thususe a random path only if the adapter is not waiting for any echo packetfrom the target on the intended virtual lane. Reliable packets otherwiseuse the same route used by last packet sent to that target. The currentpath bits identify this last path used by a reliable request or responsepacket. The random algorithm selects among the preferred paths that havenot encountered a path failure if possible (see below). Other paths aretried only if necessary to avoid reporting a connection failure (seebelow).

The logical ID value obtained from the Path Table is the designationthat a remote adapter and software using that adapter use to referencethe local adapter. This value is included in outgoing packets so thatthe target can identify who generated the packet. See above 16 forinformation relevant to logical ID values.

All packets sent from the local adapter include a field specifying thephysical ID value of the intended target as obtained from the pathtable. The receiving adapter includes a 16 bit physical ID registeruniquely identifying that adapter within the system. It discards areceived packet that it determines has been misrouted. A value of allone's represents a universal ID. An adapter with this value in itsphysical ID register accepts all packets. A packet with this targetphysical ID value is accepted by all adapters. TABLE 25 Route TableField Bits Significance 0000 4 Field contains the value ‘“0000”indicating non-adaptive, non-broadcast routing. route 13 × 4 Fielddescribes the exact path the packet takes nibbles through variousexternal switches or adapters to get to the targeted adapter. There are13 separate nibbles, starting from the left, with each containing avalue from “0000” to “0111” to indicate the next switch or adapter sendport in the path or the special code of “1111” indicating the end ofuseful information. port 8 Field indicates which adapter output port touse. 00000000 send non-broadcast packets out adapter port 0 00000001send non-broadcast packets out adapter port 1

The route table is used to define the route field for all non-broadcastpackets. The table is not used for broadcast operations. They insteaduse the Broadcast Registers described below. The information in theroute table is used to direct a packet through a particular sequence ofswitches, cables and adapters during non-broadcast operations (whichinstead use the Broadcast Registers). There are four separate routes inthis table for every remote adapter that is targeted. The 56 bit routefield used for all non-broadcast packets is obtained directly from bytes0-6 of the route table for each the four possible paths.

Route table entries are defined by service processor software duringadapter initialization. Service processor software can later modifyselected entries while the adapter is operational through writeconfiguration commands. However, if a series of message passingoperations is simultaneously using that route table entry, the hardwaremay deliver a packet out of order thus invoking a packet retransmission.The retransmission is typically successful, thus avoiding a somewhatmore serious path failure condition. TABLE 26 Broadcast Registers FieldBits Significance lookup 16 Field identifies the route table entry inall switch table chips processing the packet. The switch chip entryindex defines which switch output port(s) should be used. It is an 8 bitfield containing a “1” in bit positions associated with output portsthat process the packet and “0” in ports that do not. port 4 Fieldindicates which adapter output port to use. 0000 Send broadcast packetsout adapter port 0 0001 Send broadcast packets out adapter port 1

Broadcast operations do not use the path or route tables associated withnon-broadcast packets. Broadcast operations do not have the equivalentof the path table flags field and use hard coded equivalents of thelogical ID and physical ID fields.

Broadcast packets use the broadcast ID value of all one's to specify thetarget logical ID. They use the universal ID value of all one's tospecify the target physical ID.

The packet route field generated by the adapter during broadcastoperations uses a predefined format understood by the adapter. Theadapter builds the route based on a random selection among 1 of 4broadcast registers. Bits 16-31 of the packet route field are obtainedfrom the lookup table index field in that register. Bit 0 is set to “1”and all remaining bits of the 56 bit route field are set to “0.” Theadapter uses the port field in the selected broadcast register toidentify the adapter's output port to launch the packet.

Broadcast operations assume that the service network initializes theroute tables within each switch chip plus the broadcast registers withineach adapter chip in a consistent manner. TABLE 27 Sequence Table FieldBits Significance send 8 The next packet sequence number to insert in arequest or response packet sent to the remote adapter known locally withthis logical ID value. receive 8 The next packet sequence number toexpect in a request or response packet received from the remote adapterknown locally with this logical ID value. A request or response packetreceived with a packet sequence number equal to this value is processedand an echo packet is returned to the remote adapter. A request/responsepacket received with a sequence number less than this value is discardedwithout processing after an echo packet is generated (apparently an oldecho was lost). A request or response packet received with a sequencenumber greater than this value is discarded without generating an echo.The echo packet includes the packet sequence number of the packet beingechoed. Incoming packets include the logical ID value used by thisadapter. echo 8 The next packet sequence number to expect in an echopacket received from the remote adapter known locally with this logicalID value. The echo packet indicates whether it is echoing a requestpacket or a response packet. Any other packet is discarded. Incomingecho packets include the logical ID value used by this adapter.

The sequence table is used by the message passing transport logic toinsure that packets using the reliable transport protocol aretransferred between adapters in a fixed reliable order. The unreliabletransport protocol does not use the table. A set of sequence numbers ismaintained for every virtual lane. (A virtual lane is the logicalpartitioning of a single physical channel into a plurality of virtualchannels, that is, virtual lanes, via dividing access time on thephysical channel amongst the virtual lanes.) A set of sequence numbersis maintained for every virtual lane against every pair of adapters thatcan exchange information. One lane carries request packets while anothercarries response packets. Every packet includes a sequence number that areceiving adapter can check to detect lost packets, duplicate packets orpackets that arrive out of order. This, along with normal packet CyclicRedundancy Check (CRC) error checking, redundant cabling, and the factthat adapters respond to incoming packets with an echo back to thesender within a fixed time period, allows the system to detect andrecover from essentially any kind of transmission failure.

Sequence numbers normally use values x‘00’ (where the “x” denotes ahexadecimal representation) through x‘FE’. The value x‘FF’ indicates thespecial reset sequence code used to establish communication with atarget. The table is initialized to this value during adapterinitialization. The adapter also forces selected table entries to thisvalue after detecting a connection failure. This allows the connectionto be reestablished without service processor intervention.

The content of the sequence table is not available to either server orservice processor software (except possibly for debug purposes).

Exception Handling

Exceptional conditions may prevent successful message transfers. Theseconditions include simple recoverable link events of statisticalinterest, transient programming conditions requiring software tore-attempt a transfer, programming failures, and unrecoverable hardwarefailures. These conditions may be recorded in the descriptor completioncode field, the channel's LMT channel status field, or in statusregisters presented to the service processor.

All hardware failures and partition protection software failures(considered to be a potential security exposure) are reported to theservice processor. This includes reporting of exceptional linkconditions that may or may not actually represent a failure, such aslinks becoming operational or non-operational due to remote serversbeing power on or off.

Exception conditions are classified as either fatal or nonfatal. A fatalcondition stops all further activity on the channel affected while anonfatal condition does not. Fatal conditions may be caused byprogramming errors or severe hardware failures. They are always reportedto server software (except for checkstop). They are also reported toservice processor software if the condition is due to a hardwarefailure. Nonfatal conditions may be the result of a normal operatingcondition of interest only to server software (and thus presented onlyto server software) or due to the occurrence a recoverable hardwarecondition of interest only to service processor software (and thuspresented only to service processor software).

Fatal conditions are reported to server software by recording a code inthe channel status field within the affected channel's LMT entry. Aprocessor interrupt is produced and the channel number is recorded in aninterrupt queue. The condition may have been detected while attemptingto fetch a descriptor or while processing a descriptor. Any descriptoractive at the time of the fatal condition is left unmodified. The LMTdescriptor offset field points to the next unmodified descriptor, whichthe hardware was either attempting to fetch or was processing at thetime the condition was detected. Until software clears the LMT channelstatus field, the hardware discards any user command or incoming packetdirected to that channel.

Nonfatal conditions are reported to server software by recording a codein the completion code field of the descriptor being processed when thecondition is detected. Operations on that descriptor are aborted withprocessing continuing with the next descriptor, if any, in the channel'sdescriptor list. A processor interrupt is generated only if thatdescriptor requested an interrupt following completion of thatdescriptor.

Service Network

The service network includes service processors controlling individualadapters or switches physically located throughout the system plus oneof more central controlling elements (referred to as the HSC or HardwareService Console). The service network provides two functions used inmessage passing. It initializes hardware prior to server software usingmessage passing and it then monitors the system for the occurrence ofhardware exception conditions. It is, however, not required toparticipate in any dynamic recovery process. It may choose to modifyroutes as it learns about fabric conditions thus preventing futureproblems or may choose to remove an adapter from the configuration. But,its major role is simply to initialize and report failing components.The hardware informs the service network, through the local serviceprocessor, whenever any condition occurs that indicates a hardwarecomponent is defective or has experiences a “soft” failure. The serviceprocessor may select a subset of conditions about which it is to benotified.

Link Conditions

All links are continuously monitored for any potential loss ofintegrity. They automatically go through a retiming procedure thatadjusts skew between individual signals of the interface when necessaryto insure that data transmissions are not corrupted. If either side of alink determines that the interface can not reliably be used, it disablesthe interface and reports a link disabled condition to the serviceprocessor controlling that component's operation. While the link is in adisabled state it discards any packets that attempt to use it. It alsocontinuously attempts to reestablish a reliable connection and reportsto the service processor a link enabled condition if it is successful.These actions may or may not occur while the adapter is actuallytransmitting a packet.

Reliable transmission protocols may encounter three additionalscenarios. An adapter sending a reliable request or response packet,expects to receive an echo packet verifying that the targeted adapterdid correctly receive the information. An adapter failing to receivethis verification within a timely manner resends the information overthe same physical path to the target and reports a packet retriedcondition to its service processor. This failure may be caused by a linkdisabled condition associated with one of the links used by the packet.If this retransmission also fails, it resends the information over adifferent physical path and reports to the service processor a pathfailure condition. The adapter marks the failing path in its Path Tableas being potentially unusable and only tries to use it again if allother paths are found to be defective.

If all attempts over all available paths to the target fail, the adapterreports that a connection failure has occurred. This is a seriouscondition. The hardware cannot determine the exact state of thecommunication between the failing adapters. In a system with redundantswitch paths, it probably indicates that the target server hascheckstopped or has been powered off. Server software may continue toattempt communication with the target. This results in the adapterattempting to restore communications using any one of the four paths andresynchronizes the internal sequence number tables maintained by the twoadapters if successful.

Flit Retried

A flit retried indication is sent to the service processor whenever alink retransmits a 32 byte “flit” lost signal due to noise, excessiveskew between signals, or another failure condition. If the retry issuccessful, the affected flit is delayed by approximately 100 ns. If theretry is not successful after two attempts, the condition is escalatedto link retimed. The number of retime attempts allowed before escalatingthe condition is modifiable by the service processor. The indication tothe service processor can be masked off if desired. Server software isnot informed of this event. (As used herein, the term “flit” is used toindicate the smallest unit of data processed by the switch fabric; inthe presently preferred design, a flit is 32 bytes of data.)

Link Retimed

A link retimed indication is sent to the service processor whenever thehardware determines that a link is encountering excessive flit retryevents. This may be caused by excessive skew between signals. If true,the link is restored to normal operation by temporarily halting linkactivity and performing a link timing sequence to readjust the skewbetween individual signals. If the retime is successful, the affectedpacket is delayed by approximately 400 microseconds (μs). If the retimeis not successful after four attempts, the condition is escalated to alink disabled condition and all packets using that link are discarded.The indication to the service processor can be masked off if desired.Server software is not informed of this event.

Link Enabled

A link enabled indication is sent to the service processor whenever alink transitions from a non-operational state to an operational state.When using reliable protocols, packets automatically resume using thenow available link when it becomes necessary to avoid losing a packet.The indication to the service processor can be masked off if desired.Server software is not informed of this event.

Link Disabled

A link disabled indication is sent to the service processor whenever alink transitions from an operational state to a non-operational state.When using reliable protocols, packets attempting to use the nownon-usable link are automatically rerouted to an alternate link, if analternate exists. While disabled, the hardware continuously attempts toretime the link. If successful, the hardware reports a link enabledcondition. The indication to the service processor can be masked off ifdesired. Server software is not informed of this event.

Packet Retried

A packet retried indication is sent to the service processor whenever apacket is resent by an adapter because it did not receive an expectedecho packet within approximately 1 millisecond of sending a request orresponse packet. If the retry is not successful, the condition isescalated to a path failure condition. The indication to the serviceprocessor can be masked off if desired. Server software is not informedof this event.

Path Failure

A path failure indication is sent to the service processor whenever anadapter believes that a path to a remote adapter is defective. Thisevent occurs when a packet is sent twice over a path without receivingan echo from the target adapter. The hardware only attempts to use thefailed path again if necessary to avoid a connection failure. Afterreporting the path failure condition, the hardware attempts to transmitthe information using another path. If all attempts over all paths fail,the condition is escalated to a connection failure condition. Theindication to the service processor can be masked off if desired. Serversoftware is not informed of this event.

Connection Failure

A connection failure is an indication that a reliable packet may nothave been delivered to a targeted adapter. The indication is sent to theservice processor whenever all attempts to send a reliable requestpacket to a remote adapter have failed to return an echo packet usingall available paths multiple times, or when an expected request orresponse packet is not received within a time out period, or when anincoming packet does not have either the expected descriptor or datasequence number. A failure to receive an echo to a reliable responsepacket may not necessarily invoke a connection failure. The event isalso reported to server software as a nonfatal condition and set in theactive descriptor of the channel encountering the failure if it isassociated with a request packet. A channel reporting a connectionfailure pauses long enough for any remote channel involved in theoperation to time out the operation. The indication to the serviceprocessor can be masked off if desired. The connection failure does notprovide any information about the status of the remote adapter.

Adapter Failures

The detailed procedures for handling internal adapter hardware failuresare largely implementation dependent, however there are basic guidelinesthat should be followed. The adapter reports all internal hardwarefailures and/or exceptional conditions to the local service processor.Because of the fairly high soft error rate associated with on-chip oroff-chip SRAM components, the adapter can tolerate single bit failure inthese components. Other internal failures may also impact the adapter'sability to operate reliably. If a failure is isolated to processing of asingle channel then operations on that channel are aborted and a channelfailure condition is reported to server software. Software redefinesthat channel's LMT entry before continuing operations with that channel.If the failure cannot be isolated to a particular channel, but can beisolated to the message passing function, then the adapter stopsprocessing all message passing activity and reports a messaging failurecondition to server software. A failure that is isolated to the messagepassing function should not impact other operations. However, a hardwarefailure that cannot be so isolated causes the adapter and server tocheckstop.

Channel Failure

A channel failure is caused by an internal adapter hardware failure thatcan be isolated to the operation of a single channel. That channel hasthe fatal channel failure condition recorded in its LMT channel statusfield. This condition indicates that the adapter lost track of what itwas doing and cannot determine the exact status of activity associatedwith the channel. While the condition is present in the LMT, thehardware discards any user command or incoming packet directed to thatchannel. There is no indication that a user command or incoming responsepacket is discarded. An incoming request packet results in a channelunavailable condition being returned to the sending channel. Anydescriptors marked as complete by the adapter reflect the correct stateof that operation. The error occurred while the hardware was processingthe first descriptor in the descriptor list that was not marked ascomplete. The status of operation associated with this descriptor cannotbe determined by the hardware nor, if software did not set theserialization flag in this descriptor, can it determine the status ofdescriptors beyond this point. If software did set the serializationflag, then work beyond this point has not started. The failure may havecorrupted the descriptor offset field or any reserved field in the LMT.Software may continue operations with the channel only after it uses aseries of write LMT privilege commands to reinitialize all portions ofthe affected LMT entry. Preferred embodiments of the present inventionescalate all channel failure conditions to a messaging failureclassification.

Messaging Failure

A messaging failure is caused by an internal adapter hardware failurethat is isolated to the message passing function but not to a particularchannel. All Interrupt Status Registers (ISRs) used by the messagepassing function have the condition recorded. The failure indicates thatthe adapter lost track of what it was doing with all channels. Themessage passing function is made unavailable and is reset before it doesfurther work. While message passing is not available, the hardwarediscards all user commands and all incoming packets. It also returns avalue of all one's to any read interrupt queue command (an empty queueindication). Before message passing operations are restored, all LMTentries are marked invalid and all interrupt queues and work queues arepurged. The sequence performed by hardware detecting this condition is:

-   -   1. The hardware sets the messaging failure and resets the        message passing available bit in every ISR.        -   Server software using message passing may enable an            interrupt when the message passing function becomes            unavailable due to the failure or again becomes available            after being reset. Software not using message passing need            not receive an interrupt and may ignore both the messaging            failure and message passing available bits.        -   Server software resets the messaging failure bit when it has            recognized the condition.        -   Applications using the failed adapter may be terminated or            have their operations directed to another adapter.    -   2. The hardware stops all message processing activity and        discards packets received while the message passing function is        not available. This may cause other adapters in the network to        report a connection failure condition.    -   3. Adapter hardware, with or without service processor        assistance, resets hardware state machine latches and set all        bits of all LMT entries to a “0” value. This indicates that all        entries are in the invalid state, there are no channel groups        defined and all interrupt and work queues are empty. The adapter        includes configuration information originally defined by the        service processor. Most of these facilities are protected from        single bit failures using Error Correction Coding (ECC) or other        redundancy techniques. Recovery from double bit errors, if        desired, employs service processor assistance to reestablish the        original contents.    -   4. Service processor software or adapter hardware, depending on        the implementation, sets the message passing available bit after        it has reset the adapter. Server software only uses the adapter        when this bit indicates that the function is available.    -   5. Server software recognizing that message passing is again        available, may redefine channels and resume operations.        Message Passing Unavailable

The message passing unavailable condition is not itself an adapterfailure, but can exist either due to a messaging failure, as describedabove, or because the service network has not yet initialized theadapter or has shut down adapter operations. In all cases theavailability of message passing is indicated by the value of the messagepassing available bit in every ISR. When message passing is unavailable,the adapter can perform a limited set of actions. It cannot send orreceive message passing packets nor process any kind of channelactivity. Although it continues to service many types of MMIO commands,it discards selected types of write operations and returns all one's toselected read operations. The following table identifies the adapterbehavior while message passing is unavailable: TABLE 28 Command BehaviorWhen Message Passing is Unavailable Command Action start message alluser commands are discarded step message prefetch user suppressinterrupt enable interrupt clear condition read ISR return ISR valuewrite ISR modify ISR value read interrupt queue return all one's readTOD return TOD value read physical ID return physical ID value stopchannel command discarded restart channel command discarded resetchannel command discarded select channel command discarded test channelreturn all one's read SRAM address read address value write SRAM addressmodify address value read SRAM data & increment return SRAM value &increment address address write SRAM data & increment discard data &increment address address after message passing becomes available,command continues to discard data until write SRAM address command isissuedCheckstop

A checkstop condition is caused by an internal adapter hardware failurethat cannot be isolated to the message passing function. The failure maybe associated with the adapter's server interface, service processorinterface, interrupt generation logic or function not associated withmessage passing. The condition causes all operations in the adapter andserver to halt. Service processor intervention is required to re-IPL(Initial Program Load) the system.

Programming Conditions

Insufficient Space

A nonfatal insufficient space condition is recorded in a source of pushdescriptor if a reliable packet is targeted to a channel having adescriptor other than branch or target of push. A processor interrupt isgenerated only if the associated descriptor requested an interrupt. Anydata that could not be processed is discarded without recording anyindication of how much is discarded. Local activity continues with thenext descriptor. The condition is not reported to the target server norto the service processor on either server.

Channel Unavailable

A nonfatal channel unavailable condition is recorded in a reliablesource of push, target of pull, remote read, or remote write descriptorif the target channel in the invalid state, has a different user keyvalue than the local channel, or has a fatal condition in it's LMTchannel status field. A processor interrupt is generated only if theassociated descriptor requested an interrupt. Local activity continueswith the next descriptor. The condition is not reported to the targetserver nor to the service processor on either server.

Failed to Start

A fatal failed to start condition is recorded when a channel with aremote read, remote write, source of push, or target of pull descriptorcannot initiate a transfer with a target server because of anincorrectly defined entry in either the local or remote descriptor, LMT,or address translation table. A processor interrupt is unconditionallygenerated and activity halts on the affected channel. The condition isnot reported to either the target server nor to the service processor. Afailed to start condition is reported rather than a failed to completecondition if the error does not impact the target thus not changing thetarget's LMT entry nor descriptor list.

Failed to Complete

A fatal failed to complete condition is recorded when a channel with aremote read, remote write, source of push, or target of pull descriptorcannot complete a transfer with a target server because of anincorrectly defined entry in either the local or remote descriptor, LMT,or address translation table. A processor interrupt is unconditionallygenerated. Local activity halts on the affected channel. The conditionis not reported to the service processor on either server. A failed tocomplete condition is reported rather than a failed to start conditionwhen the error may impact the target thus changing the target's LMTentry or descriptor list. A target server that is impacted also reportsthe failed to complete condition.

Channel Stopped

A fatal channel stopped condition is recorded when a channel processinga source of pull, target of pull, source of push, target of push, remoteread, or remote write descriptor receives a reliable packet while in thestopped state or sends a reliable packet to a channel that is in thestopped state. A processor interrupt is unconditionally generated andactivity halts on the affected channel. The condition is not reported tothe service processor. A channel unavailable condition has priority overa simultaneous channel stopped condition.

Reporting

Preferred implementations of the present invention include many errorcheckers with many separate error indications providing a high degree ofexactly what type of hardware or software exception condition isdetected. The implementation specification includes information aboutindividual checkers and the information recorded. This detailedinformation is available through the service processor or to serversoftware for development debug purposes. Architecturally, groups ofsimilar error conditions are combined. The following table shows thefailure classifications available along with the code point each sets inthe descriptor condition code field or the channel's channel statusfield and whether an indication is sent to the service processor. TABLE29 Report Types Service Descriptor LMT channel processor Type Reason CCfield status field notified none The current descriptor and channel haveno active error condition. 1111 0000 na completed The current localdescriptor has successfully completed. 0000 0000 na flit retried A flitis being retransmitted across an individual link na na yes link retimedA link is being retimed na na yes link enabled A non-operational linkdirectly attached to the adapter has become na na yes operational. linkdisabled An operational link directly attached to the adapter has becomena na yes non-operational. All packets using that link is discarded.packet retried The adapter has not received an expected echo packet. Theadapter is na na yes resending the associated request or responsepacket. path failure The adapter has failed to receive an expected echopacket over the same path na na yes twice. The adapter selects analternate path and resend the associated request or response packet.insufficient space A source of push reliable transfer had more data thanthe remote adapter 0001 na no could process before detecting adescriptor other than branch or target of push. The excess data isdiscarded. Local processing continues with the next descriptor. channelA remote channel is marked as invalid or stopped, does not have thecorrect 0010 na no unavailable user key value or has a fatal conditionin its channel status field. Other fields in the remote channel's LMTentry are ignored. Local processing continues with the next descriptor.The remote channel is not modified. connection A failure has occurredpreventing communication with the remote adapter. 0011 na no failureThis includes transmission failures over all available paths, internaladapter failures confined to communication with the remote adapter, andremote server failures preventing a response being returned. Localprocessing continues with the next descriptor. The status of the remoteadapter/channel is not known. failed to start Conflicting information ineither the local or remote channel's LMT entry na 0100 no (other thanthat reported as channel unavailable). Processing of the local channelis halted with a fatal condition. The remote channel is not modified.failed to Hardware detected invalid or conflicting information in eitherthe local or na 0101 no complete remote channel's LMT entry, descriptoror TCE preventing completion of a message passing transfer. Processingof the local channel is halted with a fatal condition. The status of theremote channel is not known. channel failure A server or adapter failurehas occurred that can be isolated to the current na 0110 yes channel.Processing of the local channel is halted with a fatal condition. Thestatus of the remote channel is not known. channel stopped A reliabletransfer was attempted while in the stopped state. The condition is na0111 yes recorded and activity is halted in both the local and remotechannel. messaging failure The adapter has detected an internal failurerestricted to message passing na na yes operations but can not beisolated to a connection failure or a channel failure. a bit is setWhile the adapter is resetting itself due to this failure, it acceptsand discard in the commands received from server software, stops allinternal operations, and adapter ISR discards all incoming messagepassing packets. It processes service processor activity. When theadapter has finished this process, it generates a special messageinterrupt to every interrupt level used by the adapter. checkstop Theserver or adapter has detected an internal failure that can not beisolated na na yes to message passing hardware. The adapter stops allnon-service processor activity.

Usage Considerations

Sharing a Receive Channel

A channel defined as the target of push operations is used to receivedata from multiple independent sources if certain software restrictionsare followed. These restrictions account for the fact that oncereceiving hardware starts to process a push operation involving multiplepackets, it rejects packets sent from another source until the operationtransfers all of the data associated with a single source of pushdescriptor. The rejected packets get marked with a nonfatal failed tostart condition. Although software can retry the failed operation thereis no guarantee that it won't also encounter a busy condition. It isrecommended that this situation be avoided by restricting pushoperations targeted to a shared channel to a single packet.

The receiving channel processes incoming packets strictly in the orderthat they arrive without recognizing that they might originate fromseveral independent sources. This means that the receiving memory buffermay contain a series of packets from one source interleaved with aseries of packets from other sources. The data from a given source isplaced in memory in the same order as sent and data from a single packetuses consecutive locations; however, data from multiple packets may notbe stored consecutively. This means that the software is given the jobof understanding how hardware constructs packets during push operationsand includes sufficient information in each packet to enable receiveside software to reconstruct the information sent from each source.

The hardware formats packets with up to 2K bytes of data. A packet onlyincludes data specified by a single source of push descriptor or aseries of preload data descriptors and a single source of pushdescriptor. As described above, the combination of preload data followedby a source of push descriptor effectively extends the definition of thesource of push to gather data from disjoint memory regions into a singlepacket. A packet includes 2K bytes if there are at least 2K bytes leftto send for a single preload data, source of push combination. If thereare less than 2K bytes left, it sends all of it in a single packet. Theposition of the data in memory does not affect the number of packetsgenerated. A channel defined to use the unreliable mode, may not specifymore than 2K bytes in the combination of preload data and source of pushdescriptors.

Each descriptor on the receive side should, ideally, only reference upto a 2K data area. Although not absolutely necessary, this does allowreceive side software to recognize individual packets immediately asthey arrive and enables software to use the source ID and source channelfields in the descriptor to identify the initiating adapter and channel.Use of both the send side and receive side marking functions describedabove, are also recommended, although not absolutely required.

All channels sending information to a common receive channel use thesame user key value as the receiving channel, or deactivate the user keyprotection mechanism by specifying the universal key value of all one'sin either the sending or receiving channel.

Partitioning

There are several support tasks that are performed by the operatingsystem rather then user level code. They include allocation of channelswith the associated processor page table modification, updating the LMT,and maintenance of the message passing address translation table. Priorto the introduction of logical partitioning (LPAR) such tasks wereperformed by kernel code or code running as an extension to the kernel.This code was trusted to manage all of the resources contained withinthe server, including memory management through the maintenance ofprocessor page tables and the I/O equivalent TCE tables. This is alogical division of labor. Resources needed to be controlled from asingle agent and that's exactly the purpose for which operating systemswere designed. LPAR changes this model. Multiple operating system canrun under LPAR with each unaware of the other, but protected from theother's behavior. The service processor hides some of thecharacteristics of this new model from individual operating systems.However, traditional kernel level code can longer be trusted withcertain functions, such as the maintenance of page tables. This requiresmoving some functions to new ‘more-trusted’ hypervisor software.

When running in an LPAR environment, hypervisor assistance is providedfor use in the message passing function. The hypervisor has knowledge ofthe architecture and is the only software allowed to allocate channels,update processor page tables, update the LMT, or maintain the messagepassing address translation tables. In addition, it is not possible tocreate a trusted user, other than the hypervisor, capable of generatingreal addresses to avoid the message passing address translation process.

The adapter implementing message passing may be entirely assigned to asingle operating system by the hypervisor, or it may be shared bymultiple operating systems with the hypervisor allocating separategroups of channels to each.

Command Ordering

The PowerPC architecture provides a weakly consistent storage model.This means that the order that a processor performs storage accesses,the order in which those accesses complete in main storage, and theorder in which those accesses can be viewed by a third party such asanother processor or I/O adapter, may all be different. The advantage ofa weakly consistent model is that it allows the processor to run veryfast for most storage accesses. It does, however, require software toperform additional steps when sharing storage data with anotherprocessor or hardware device. This means that message passing softwareis given the task of insuring the following:

-   -   1. Software may not issue a start message or prefetch user        command until it insures that the adapter recognizes any        previous changes it has made to descriptors or data buffers. It        may issue the PowerPC sync instruction between the memory update        and the start message or prefetch command to accomplish this.    -   2. When software is adding new descriptors to the end of an        active descriptor list it can only remove the original end of        list indication after all other changes to the list are made        visible to the adapter. It may accomplish this by issuing either        the PowerPC lwsync or sync instruction just before the store        instruction changing the type field. (While these instructions        are specifically mentioned as the preferred mechanism for        providing this function, it should be understood that other        processors possess instruction sets that are capable of        providing this same functionality using one or more other or        different instructions.)

The PowerPC architecture classifies the MMIO load/store instructionsused to implement user and privileged commands as being directed to“device memory.” These real address values have the caching inhibitedand guarded PowerPC attributes. Because of this, a series of MMIO storeinstructions, such as user commands, are delivered to the adapter in thesame order as perceived by the issuing software. However, the internaladapter design point allows them to be physically processed in adifferent order. To insure correct behavior, software follows thefollowing rules:

-   -   1. Software may not modify the LMT or address translation table        unless the test channel command indicates that the channel is in        the stopped or invalid state.    -   2. Software may not issue a user command after modifying the LMT        unless the test channel command indicates that the channel is in        the valid state.    -   3. Software insures that changes associated with the write        interrupt status command have actually taken place before        issuing additional commands that may cause the hardware to        change the interrupt status. It may accomplish this by        immediately following the command with a read interrupt status        command.

The PowerPC architecture does not require the hardware to maintain anyordering between MMIO load instructions or between MMIO load and storeinstructions unless the instructions are issued to the same address.There are six privileged commands implemented as MMIO load operations.These commands do not usually require specific software ordering.However, each usage should be reviewed. Software can enforce ordering byplacing either the PowerPC eieio or sync instruction between thecommands of concern. The eieio instruction is used for “enforcingin-order execution of I/O.” While these specific instructions arementioned here as a preferred mechanism for enforced ordering, it shouldbe understood that the present invention is not limited in this regard.Various processors have their own instruction sets that are capable ofproviding this function. The obvious cases that do require attentionare:

-   -   1. Any privileged command following a read interrupt status        command;    -   2. The sequence select channel followed by a test channel; and    -   3. Any combination of address or data accesses to the LMT        Unreliable Transmission

As identified above, a channel used for push operations may indicate inits LMT entry that the hardware should use unreliable, rather thanreliable, transmission protocols. This mode is provided to eliminate theextra link activity required by hardware guaranteeing reliable in-orderdelivery when the function isn't needed. The mode limits the amount ofdata that is sent using a single source of push descriptor to a maximumof 2,048 bytes—the current maximum size of a single packet. The hardwareusing unreliable transmission protocols does not guarantee delivery nordoes it indicate if a transfer is successful or unsuccessful. Thedetermination of success or failure and the recovery of failedtransmissions is performed using software.

Special Values

The specific design of the present invention typically reserves adescriptor, LMT, or packet field value of all one's as an indication ofsomething special. These cases are:

-   -   1. a logical ID value of x‘FFF’ defines a broadcast ID value.        Software places this value in the target ID field of an        unreliable source of push descriptor to initiate a broadcast        operation. Hardware then places this value in the broadcast        packet's source logical ID field and in the source ID field of        the target of push descriptor.    -   2. a physical ID value of x‘FFFF’ defines a universal ID value.        Hardware normally uses a physical ID field within a packet to        identify the packet's intended target. The receiving adapter        discards the packet if it doesn't contain the unique value        service processor software assigned to it. Hardware places the        universal ID value in a broadcast packet to deactivate this        test. Service processor software may prevent this test for all        packets received by an adapter by placing the universal ID value        in that adapter's physical ID register. It may also prevent the        test for all packets sent from a particular adapter to a        particular receiving adapter by placing the universal ID value        in the physical ID field of the corresponding path table entry        within the sending adapter.    -   3. a user key value of x‘FFFFFFFF’ defines a universal key        value. The hardware only allows channels to accept packets from        channels having a common user key value indicating that both        channels belong to the same application. Privileged server        software may set a channel's LMT user key field to the universal        key value to deactivate this test.    -   4. a packet sequence value of x‘FF’ defines a synchronization        value. The hardware normally generates and accepts reliable        packets with a logically increasing sequence number between        x‘00’ and x‘FE’. The hardware uses the synchronization value to        establish a common sequence number value between a sender and a        receiver during adapter initialization or following a connection        failure. This special value is always accepted and resets the        next expected value to x‘00’.

Fabric Interface

This section describes the packet formats, transfer sequences and rulesused to communicate between message passing adapters.

Packet Types

Message passing defines four packet types referred to as request packet,response packet, echo packet and an unreliable packet. Request packetseither include data or ask for the targeted adapter to return data tothe issuer. Response packets are produced by an adapter receiving arequest packet asking for data or to indicate that the operation hascompleted while using the reliable acceptance transmission mode. Echopackets are issued whenever a request or response packet is correctlyreceived by a target adapter. An unreliable packet is a specialvariation of a request packet associated with push operations usingchannels providing unreliable transfers. It does not have an associatedresponse or echo packet.

In currently preferred embodiments of the present invention, all packetscontain a packet header of 32 or 48 bytes. The header format isidentical for all packet types, although some fields may be unused ineach packet type. Request, response, and unreliable packets may includepacket payload or data of up to 2048 bytes. Echo packets contain 32bytes of header with no data.

All packets are checked for transmission failures, a correct targetphysical ID and a non-stale time stamp value while reliable packets arealso checked for an expected packet sequence field before being acceptedby a receiving adapter. Every source/target adapter pair maintains a setof packet sequence numbers for each virtual lane. They are used todetect missing or duplicated packets and along with a time out mechanismmanaged by the sender allows the hardware to provide reliable in-orderexactly once type packet delivery. Use of a special synchronizationvalue allows the adapter pair to establish a common set of packetsequence numbers. This synchronization process occurs with the firstreliable packet sent to the target following system initialization orfollowing a connection failure. The hardware may not always be ablerecover from transmission failures during this synchronization process.Three additional fields, associated with source/target channels, allowthe hardware to report a connection failure if it cannot recover fromsuch a failure. The pull sequence field is incremented for each newremote start type of request packet and is copied into all subsequentpackets transmitting pull data. The data sequence field is incrementedfor each new packet sent from the same channel. The descriptor sequencefield is incremented each time the sender processes a new descriptor andallows multiple descriptors to be active simultaneously during thereliable acceptance mode. The rules associated with generating and usingthese fields are provided below.

Links transmit payload information plus error detection, retry,clocking, and flow control information in sideband signals. Links alsosupport the transmission of TOD (Time of Day) synchronization packetsand service packets.

Request Packet

A request packet is used either to send data to a targeted adapter or totell that adapter to send data back to the requester. All requestpackets use virtual lane 5. All request packets accepted by the targetresult in an echo packet being returned.

A single descriptor may produce multiple request packets. The firstpacket is marked as “first” while the last packet is marked “last.” Atransfer that cannot complete successfully because of an error detectedafter the first packet generates a “last” packet with the completioncode field indicating the type of abnormal condition detected. TABLE 30DW Bits Size Label Significance 0  0-55 56 route identifies path throughfabric 56-63 8 packet type x‘0C’ - packet expecting echo 1  0-15 16target physical ID system wide target identifier - used to identifymisrouted packets 16-27 12 source logical ID identifies adapter, asknown by target, initiating the packet 28-29 2 echo path indicates thepath to return an echo 30-32 3 header size number of 16 byte units inthe header over 32 000 - if operation is a push, pull or remote start001 - if operation is a read or write 33-63 31 time stamp used toidentify stale packets (incremented every 27.2 us) 2 0-7 8 retry bufferentry copied to echo to identify packet being echoed  8-15 8 packetsequence used to identify out of sequence packets 16-19 4 data sequenceused to identify lost packets within single descriptor 20-23 4 packetsubtype 0000 - request packet 24-27 4 packet flags bit 0: first packetgenerated by descriptor packet bit 1: last packet generated bydescriptor header bits 2-3: undefined 28-31 4 pull sequence used toidentify packets associated with a given remote start 32-47 16 targetchannel identifies channel that processes this packet 48-51 4 descriptorsequence copied from issuing channel's LMT descriptor sequence field52-55 4 operation 0010 - write with data 0011 - read without data 0100 -push with data 0110 - pull with data 0111 - remote start without data56-63 8 descriptor flags copied from sender's descriptor 3  0-15 16source channel identifies the channel initiating this packet 16-19 4completion code indicates any abnormal condition 20-31 12 data countnumber of data bytes included with or requested by the packet 32-63 32user key copied from issuing channel's LMT user key field 4  0-15 16 notdefined unused remote read/ write only 16-63 48 target data offsetcopied from remote read or remote write descriptor 5  0-27 28 notdefined unused 28-63 36 message byte count copied from remote readdescriptor N     0-2K bytes  data optional data plus padding - extrabytes are padded on to the packet end of the field such that the packetincludes a multiple of 32 data bytesResponse Packet

A response packet provides data or indicates the final status of anoperation started by a previously received request packet. All responsepackets use virtual lane 6.

A request packet may produce multiple response packets. The first packetis marked as “first” while the last is marked “last.” A transfer thatcannot complete successfully because of some kind of error detectedafter the first packet was sent generates a “last” packet with thecompletion code field indicating the type of abnormal conditiondetected. TABLE 31 DW Bits Size Label Significance 0  0-55 56 routeidentifies path through fabric 56-63 8 packet type x‘0C’ - packetexpecting echo 1  0-15 16 target physical ID system wide targetidentifier - used to identify misrouted packets 16-27 12 source logicalID identifies adapter, as known by target, initiating the packet 28-29 2echo path indicates the path to return an echo 30-32 3 header size 000 -for all defined response packets 33-63 31 time stamp used to identifystale packets (incremented every 27.2 μs) 2 0-7 8 retry buffer entrycopied to echo to identify packet being echoed  8-15 8 packet sequenceused to identify out of sequence packets 16-19 4 data sequence used toidentify lost packets within single descriptor 20-23 4 packet subtype0001 - response packet 24-27 4 packet flags bit 0: first packetgenerated by descriptor packet bit 1: last packet generated bydescriptor header bits 2-3: undefined 28-31 4 pull sequence unused 32-4716 target channel copied from request packet source channel field 48-514 descriptor sequence copied from request packet descriptor sequencefield 52-55 4 operation 0010 - write without data 0011 - read with data0100 - push without data 0110 - pull without data 0111 - remote startwithout data 56-63 8 descriptor flags copied from local descriptor ifsend-receive model 3  0-15 16 source channel copied from request packettarget channel field 16-19 4 completion code indicates any abnormalcondition 20-31 12 data count number of data bytes included with packet(0 to 2048) 32-63 32 user key unused N     0-2K bytes  data optionaldata plus padding - extra bytes are padded on to packet the end of thefield such that the packet includes a data multiple of 32 bytesEcho Packet

An echo packet is produced for every request or response packet receivedwith correct CRC, target physical ID and time stamp fields along with apacket sequence value greater than or equal to the receiving sequencenumber it has recorded for the adapter issuing the request or response.It tells the remote adapter that the request or response packet wassuccessfully received, that the sender can stop the time out mechanismwaiting for the echo and can remove the request/response packet from anyretransmission buffer. The echo does not necessarily indicate that theoperating requested can be performed—only that the request or responsepacket was correctly delivered. Echo packets include a copy of the timestamp determined by the initiating adapter when the associatedrequest/response packet was sent. The request/response packet travelsfrom the initiating adapter to the target and an echo packet returnedback within a time-out period in order to be accepted. An echo packetreceived after this period is considered “stale” and is discarded. Allecho packets use virtual lane 4. TABLE 32 DW Bits Size LabelSignificance 0  0-55 56 route identifies path through fabric 56-63 8packet type x‘nF’ - echo packet, - n indicates virtual lane beingecho'ed 1  0-15 16 target physical ID system wide target identifier -used to identify misrouted packets 16-27 12 source logical ID identifiesadapter, as known by target, initiating the packet 28-29 2 echo pathunused 30-32 3 header size 000 - for all echo packets 33-63 31 timestamp copied from request/response packet being echoed 2 0-7 8 retrybuffer entry copied from request/response packet being echoed  8-15 8packet sequence used to identify out of sequence packets 16-19 4 datasequence unused 20-23 4 packet subtype 24-27 4 packet flags 28-31 4 pullsequence 32-47 16 target channel 48-51 4 descriptor sequence 52-55 4operation 56-63 8 descriptor flags 3  0-15 16 source channel 16-19 4completion code 20-31 12 data count 32-63 32 user keyUnreliable Packet

An unreliable packet provides a function similar to a push type requestpacket except that the hardware does not guarantee delivery to thetarget and the target does not return either an echo or a responsepacket after receiving the unreliable packet. Unreliable packets areonly generated when processing a source of push descriptor for a channelwhere the LMT transmission mode bit indicates unreliable transfers.Unreliable packets, along with request packets, use virtual lane 5.

The target adapter accepts and processes an unreliable packet havingcorrect CRC, target physical ID and time stamp and the target channel'stransmission mode bit indicates unreliable transfers and there is asuitable target of push type descriptor.

The descriptor initiating the unreliable packet is marked completed assoon as the associated data is transmitted. That descriptor is notallowed to specify a byte count that would result in multiple packets.Therefore an unreliable packet is marked as both the “first packetgenerated by descriptor” and the “last packet generated by descriptor.”

The contents of an unreliable packet differ from the contents of arequest packet used for push operations in the following:

-   -   1. the packet type and packet subtype values are different; and

2. the echo path, retry buffer entry, packet sequence, and descriptorsequence fields are not used. TABLE 33 DW Bits Size Label Significance 0 0-55 56 route identifies path through fabric 56-63 8 packet typex‘0B’ - packet not expecting echo 1  0-15 16 target physical ID systemwide target identifier - used to identify misrouted packets 16-27 12source logical ID identifies adapter, as known by target, initiating thepacket 28-29 2 echo path unused 30-32 3 header size 000 - for allunreliable packets 33-63 31 time stamp used to identify stale packets(incremented every 27.2 μs) 2 0-7 8 retry buffer entry unused  8-15 8packet sequence unused 16-19 4 data sequence unused 20-23 4 packetsubtype 0100 - unreliable packet packet 24-27 4 packet flags bit 0 = 1:first packet generated by descriptor header bit 1 = 1: last packetgenerated by descriptor bits 2-3: undefined 28-31 4 pull sequence unused32-47 16 target channel identifies channel that processes this packet48-51 4 descriptor sequence unused 52-55 4 operation 0100 - push -packet does include data 56-63 8 descriptor flags copied from sender'sdescriptor 3  0-15 16 source channel identifies the channel initiatingthis packet 16-19 4 completion code indicates any abnormal condition20-31 12 data count number of data bytes included with the packet 32-6332 user key copied from issuing channel's LMT user key field N     0-2Kbytes  data optional data plus padding - extra bytes are padded on tothe packet end of the field such that the packet includes a multiple of32 data bytesnote:the target physical ID and source logical ID fields contain the specialbroadcast ID value of all one's during a broadcast operation.

Transfer Sequences Unreliable Push Operation Examples

1. Sending and receiving software identify each other's channel andlogical ID values and agree on the type of transfer and maximum amountof data involved. This process may occur outside of the message passingarchitecture using some sideband capability or may use previouslyestablished message passing parameters.

2. Sending side software defines one or more source of push descriptors,each pointing to a region of local memory where hardware obtains thedata to be transferred. Each descriptor identifies the channel andadapter intended to receive the data. Preload data descriptors may alsobe used but are not included in this example.

3. Receiving side software defines one or more target of pushdescriptors, each pointing to a region of local memory where hardwareplaces the data transferred from the siding side.

4. Sending side software issues a start message command supplying alocal channel ID value that it received from the operating system whenthe channel was created. The command invokes an MMIO store instructionwith the virtual address field set to the channel ID value.

5. Sending side hardware uses the processor's address translation logicand page table to verify that the software task is authorized to issuethe command and directs the command to a specific message passingadapter. The translated real address value identifies the MMIO as astart message command, selects one message passing adapter, andindicates the channel number that adapter should use.

6. The adapter receiving the start message command verifies that thecommand and the channel it references are valid. The adapter then eitherstarts processing the channel immediately or schedules it for laterprocessing by placing the channel number in one of the two work pendinglists. The channel's LMT entry indicates which list to use.

7. When the sending side processes the channel it reads the LMT entryand the descriptor it points to. It gathers all the information it needsinto working registers including address translation and descriptorentries plus any translated real addresses it may later need.

8. The sending side verifies that the descriptor references no more than2,048 bytes and transmits one unreliable packet to the specified target.After sending the packet, the source of push descriptor is updated withthe completion code set to “completed” and a local processor interruptis generated if the descriptor requested it.

9. When the receive side detects the unreliable packet it verifies thatthe packet is acceptable (correct CRC fields, correct target physicalID, satisfactory time stamp) and then examines the indicated channel'sLMT entry and descriptor list. It verifies that the operation can beperformed, saves the data portion of the packet in memory and updatesworking registers originally obtained from the LMT and descriptor. Ifthe transfers completes a target of push descriptor it updates thatdescriptor's completion code, source channel, source logical ID, andbyte count fields.

Reliable Delivery Push Operation Examples

1. Sending and receiving software identify each other's channel andlogical ID values and agree on the type of transfer and maximum amountof data involved. This process may occur outside of the message passingarchitecture using some side band capability or may use previouslyestablished message passing parameters.

2. Sending side software defines one or more source of push descriptors,each pointing to a region of local memory where hardware obtains thedata to be transferred. Each descriptor identifies the channel andadapter intended to receive the data. Preload data descriptors may alsobe used but are not included in this example.

3. Receiving side software defines one or more target of pushdescriptors, each pointing to a region of local memory where hardwareplaces the data transferred from the sending side.

4. Sending side software issues a start message command supplying alocal channel ID value that it received from the operating system whenthe channel was created (that is, initiated). The command invokes anMMIO store instruction with the virtual address field set to the channelID value.

5. Sending side hardware uses the node's address translation logic andpage table to verify that the software task is authorized to issue thecommand and directs the command to a specific message passing adapter.The translated real address value identifies the MMIO as a start messagecommand, selects one message passing adapter, and indicates the channelnumber that the adapter should use.

6. The adapter receiving the start message command verifies that thecommand and the channel it references are valid. The adapter then eitherstarts processing the channel immediately or schedules it for laterprocessing by placing the channel number in one of the two work pendinglists. The channel's LMT entry indicates which list to use.

7. When the sending side processes the channel, it reads the LMT entryand the descriptor to which it points. It gathers all of the informationit needs into working registers including address translation anddescriptor entries plus any translated real addresses it may later needplus status information modified during the sending process such as thenumber of bytes remaining to be sent. The adapter may periodicallyexchange information between these registers and the LMT to processother unrelated activity. The LMT thus serves as a level of cachingeliminating the need to refetch descriptors and/or TCE's from mainmemory.

8. The sending side sequentially transmits as many push request packetsas needed to transfer all the data indicated in the descriptor list.Information is included in each packet enabling the receiver to identifythe first and last packets associated with a individual send sidedescriptor along with any flag bits set in that descriptor. The senderexpects to receive an echo packet for every request packet sent. It maycontinue sending additional packets only if it has sufficient resourcesto resend any packet it feels has not been echoed in a timely fashion. Afailure to receive an echo within a time out period causes packetretransmission perhaps over one or more alternate paths. A failure torecover from a series of missing echo's causes the descriptor to bemarked as unsuccessful due to a connection failure.

9. When the receive side detects a push request packet it verifies thatthe packet is acceptable (correct CRC fields, correct target physicalID, satisfactory time stamp, acceptable packet sequence number) andsends back an echo packet. The echo only indicates that the packet wasdelivered correctly. It does not imply that the receiver can perform theoperation requested.

10. When the send side detects an echo packet, it removes the matchingpush request packet from it's retry facilities and stops the associatedtime out monitor and retransmission mechanism. When the send sidedetermines that all request packets needed by the source of pushdescriptor have been sent and each has been echoed, it updates thedescriptor with the appropriate completion status and if necessarygenerates a local processor interrupt.

11. After sending an echo packet, the receive side adapter examines theindicated channel's LMT entry and descriptor list. It verifies that theoperation can be performed, saves the data portion of the packet inmemory and updates working registers originally obtained from the LMTand descriptor. As individual receive side descriptors are exhausted,they may trigger a local processor interrupt. The receiving adapter isassumed to always have sufficient resources to move the data it receivesto local memory. It may do so slowly, but cannot stall for an indefiniteperiod without making progress.

12. As each packet is received, the adapter verifies that all contain anidentical descriptor sequence number and that each contains a datasequence number one greater than the previous number. These checksinsure that the receiver learns of any temporary connection failureoccurring during the operation. The packet sequence, descriptorsequence, and data sequence number fields work together to enable bothadapters to identify connection failures impacting one operation butstill enabling subsequent operations to reestablish communicationswithout service software intervention.

13. When the receive side determines that it has received and processedall of the data a given target of push descriptor can accept, it updatesthe descriptor, generates a local processor interrupt if necessary,fetches the next descriptor from memory, and continues processing ifthere is any unprocessed push data.

Reliable Acceptance Push Operations

1. Sending and receiving software identify each other's channel andlogical ID values and agree on the type of transfer and maximum amountof data involved. This process occurs outside of the message passingarchitecture using some side band capability or, alternatively usespreviously established message passing parameters.

2. Sending side software defines one or more source of push descriptors,each pointing to a region of local memory where hardware obtains thedata to be transferred. Each descriptor identifies the channel andadapter intended to receive the data. Preload data descriptors may alsobe used but are not included in this example.

3. Receiving side software defines one or more target of pushdescriptors, each pointing to a region of local memory where hardwareplaces the data transferred from the siding side.

4. Sending side software issues a start message command supplying alocal channel ID value that it received from the operating system whenthe channel was created. The command invokes an MMIO store instructionwith the virtual address field set to the channel ID value.

5. Sending side hardware uses the node's address translation logic andpage table to verify that the software task is authorized to issue thecommand and directs the command to a specific message passing. Thetranslated real address value identifies the MMIO as a start messagecommand, selects one message passing adapter, and indicates the channelnumber that adapter uses.

6. The adapter receiving the start message command verifies that thecommand and the channel it references are valid. The adapter then eitherstarts operating or controlling the channel immediately or schedules itfor later processing by placing the channel number in one of the twowork pending lists. The channel's LMT entry indicates which list to use.

7. When the sending side processes the channel it reads the LMT entryand the descriptor to which it points. It gathers all of the informationit needs into working registers including address translation anddescriptor entries plus any translated real addresses it needs laterplus status information modified during the sending process such as thenumber of bytes remaining to be sent. The adapter periodically exchangesinformation between these registers and the LMT to process othernon-related activity. The LMT thus serves as a level of cachingeliminating the need to refetch descriptors and/or TCE's from mainmemory.

8. The sending side sequentially transmits as many push request packetsas needed to transfer all of the data indicated in the descriptor list.Information is included in each packet enabling the receiver to identifythe first and last packets associated with a individual send sidedescriptor along with any flag bits set in that descriptor. The senderexpects to receive an echo packet for every request packet sent. Itcontinues sending additional packets only if it has sufficient resourcesto resend any packet that it feels has not been echoed in a timelyfashion. It also expects to receive a response packet after the targethas processed all the data associated with a single send sidedescriptor. A failure to receive an echo within a time out period causespacket retransmission perhaps over one or more alternate paths. Afailure to receive a response within a second time out period or failureto recover from a series of missing echo's causes the descriptor to bemarked as unsuccessful due to a connection failure.

9. When the receive side detects a push request packet it verifies thatthe packet is acceptable (correct CRC fields, correct target physicalID, satisfactory time stamp, acceptable packet sequence number) andsends back an echo packet. The echo only indicates that the packet wasdelivered correctly. It does not imply that the receiver can perform theoperation requested.

10. When the send side detects an echo packet, it removes the matchingpush request packet from it's retry facilities and stops the associatedtime out monitor and retransmission mechanism.

11. After sending an echo packet, the receive side adapter examines theindicated channel's LMT entry and descriptor list. It verifies that theoperation can be performed, saves the data portion of the packet inmemory and updates working registers originally obtained from the LMTand descriptor. As individual receive side descriptors are exhausted,they may trigger a local processor interrupt on the receive side or mayrequest a remote processor interrupt to be triggered when the send sidedescriptor is exhausted. The receiving adapter should always havesufficient resources to move the data it receives to local memory. Itmay do so slowly, but can not stall for an indefinite period withoutmaking progress.

12. As each packet is received, the adapter verifies that all of thepackets contain an identical descriptor sequence number and that eachpacket contains a data sequence number one greater than the previous.These checks insure that the receiver learns of any temporary connectionfailure occurring during the operation. The packet sequence, descriptorsequence, and data sequence number fields work together to enable bothadapters to identify connection failures impacting one operation butstill enabling subsequent operations to reestablish communicationswithout service software intervention.

13. Eventually the receive side determines that it has received andprocessed all the data for a given send side descriptor. It insures thatall memory updates are complete and then updates the target of pushdescriptor condition code, source channel, source ID, and byte countfields. It then transmits a push response packet back to the send sideindicating that the operation was (or perhaps was not) successful. Ittransmits the packet only if it has sufficient resources to resend itlater if an echo isn't returned in a timely fashion. If it can nottransmit the packet due to insufficient resources, it schedules thetransmission for later processing by placing the channel number in awork queue. The receive side descriptor indicates that the responsepacket should request a send side processor interrupt.

14. When the send side detects the push response packet it verifies thatthe packet is acceptable (correct CRC fields, correct target physicalID, satisfactory time stamp) and sends back an echo packet. Again, theecho only indicates that the packet was delivered correctly. It does notimply that the information can be processed (although nothing, otherthan a hardware failure, can prevent processing a response packet). Itthen checks the information, updates the source of push descriptor, andmay trigger a local processor interrupt. If the send side does notreceive the response within a given time out period it records aconnection failure completion code in the descriptor.

15. When the receive side detects the echo packet, it removes the pushresponse packet from it's retry facilities and stops the associated timeout monitor and retransmission mechanism.

See FIG. 33.

Reliable Delivery Pull Operation

1. Sending and receiving software identify each other's channel andlogical ID values and agree on the type of transfer and on the maximumamount of data involved. This process may also use other channelsallocated to such activity.

2. Sending side software defines one or more source of pull descriptors,each pointing to a region of local memory where hardware obtains thedata to be transferred.

3. Receiving side software defines one or more target of pulldescriptors, each pointing to a region of local memory where hardwareplaces the data transferred from the siding side. Each descriptoridentifies the channel and adapter intended- to provide the data. Thefirst descriptor has the remote start flag set.

4. Receiving side software issues a start message command supplying alocal channel ID value that it received from the operating system whenthe channel was created. The command invokes an MMIO store instructionwith the virtual address field set to the channel ID value.

5. Receiving side hardware uses the processor's address translationlogic to verify that the task is authorized to issue the command anddirects the command to a specific adapter. The translated real addressvalue identifies the MMIO as a start message command, selects oneadapter, and indicates the channel number that adapter should use.

6. The adapter receiving the start message command verifies that thecommand and the channel it references are valid and then either startsprocessing the channel immediately or schedules it for later processingby placing the channel number in a work pending list.

7. When the receiving side processes the channel it reads the LMT anddescriptor pointed to by the LMT and gathers all information it needs toprocess the channel. A target of pull descriptor with the remote startflag bit set, causes a remote start request packet to be transmitted tothe channel identified in the descriptor. It expects to receive an echopacket indicating that the packet was received and later a responsepacket indicating that a valid source of pull descriptor was detected.

8. When the send side detects the remote start request packet itverifies that the packet has correct CRC fields, correct target physicalID, satisfactory time stamp, acceptable packet sequence number and sendsback an echo packet.

9. When the receive side detects the echo packet, it removes thematching remote start request packet from it's retry facilities andstops the associated time out monitor and retransmission mechanism.

10. The send side adapter examines the indicated channel's LMT entry anddescriptor list. It verifies that the operation can be performed andsaves the information contained in the remote start packet identifyingthe receive side channel and adapter LID (Logical ID). A remote startresponse packet is generated only if it can't perform the operation. Ifthe operation can proceed it behaves very similar to having received alocal start message command. It either starts processing the channelimmediately or schedules it for later processing by placing the channelnumber in one of two work pending lists.

11. When the sending side processes the channel, it reads the LMT entryand the descriptor to which it points. It gathers all the information itneeds into working registers including address translation anddescriptor entries plus any translated real addresses it may later needplus status information modified during the sending process such numberof bytes remaining to be sent. The adapter periodically exchangesinformation between these registers and the LMT to process othernon-related activity.

12. The sending side sequentially transmits as many pull request packetsas needed to transfer all the data indicated in the descriptor list. Thesender expects to receive an echo packet for every request packet sent.A failure to receive an echo within a time out period causes packetretransmission perhaps over one or more alternate paths. A failure torecover from a series of missing echo's causes the descriptor to bemarked as unsuccessful due to a connection failure.

13. When the receive side detects a pull request packet it verifies thatthe packet is has correct CRC fields, correct target physical ID,satisfactory time stamp, acceptable packet sequence number and sendsback an echo packet.

14. When the send side detects an echo packet, it removes the matchingpull request packet from it's retry facilities, stops the associatedtime out monitor and retransmission mechanism, updates the source ofpull descriptor, and generates a local processor interrupt if necessary.

15. After sending an echo packet, the receive side adapter examines theindicated channel's LMT entry and descriptor list. It verifies that theoperation can be performed, saves the data portion of the packet inmemory and updates working registers originally obtained from the LMTand descriptor. As individual receive side descriptors are exhausted,they trigger a local processor interrupt on the receive side or mayrequest a remote processor interrupt to be triggered when the send sidedescriptor is exhausted. The receiving adapter should always havesufficient resources to move the data it receives to local memory. Ifbusy, it may do so slowly, but it cannot stall for an indefinite periodwithout making progress. As each packet is received, the adapterverifies that all of the packets contain an identical descriptorsequence number and that each packet contains a data sequence number onegreater than the previous sequence number. A failure results inreporting a connection failure.

16. Went receive side determines that it has received and processed allthe data a given target of push descriptor can accept, it updates thedescriptor, generates a local processor interrupt, if necessary, fetchesthe next descriptor from memory, and continues processing if there isany unprocessed push data.

See FIG. 34.

Reliable Acceptance Pull Operation

1. Sending and receiving software identify each other's channel andlogical ID values and agree on the type of transfer and maximum amountof data involved. This process may use other channels allocated to suchactivity.

2. Sending side software defines one or more source of pull descriptors,each pointing to a region of local memory where hardware obtains thedata to be transferred.

3. Receiving side software defines one or more target of pulldescriptors, each pointing to a region of local memory where hardwareplaces the data transferred from the siding side. Each descriptoridentifies the channel and adapter intended to provide the data. Thefirst descriptor has the remote start flag set.

4. Receiving side software issues a start message command supplying alocal channel ID value that it received from the operating system whenthe channel was created. The command invokes an MMIO store instructionwith the virtual address field set to the channel ID value.

5. Receiving side hardware uses the processor's address translationlogic to verify that the task is authorized to issue the command anddirects the command to a specific adapter. The translated real addressvalue identifies the MMIO as a start message command, selects oneadapter, and indicates the channel number that adapter should use.

6. The adapter receiving the start message command verifies that thecommand and the channel it references are valid and then either startsprocessing the channel immediately or schedules it for later processingby placing the channel number in a work pending list. The work pendinglist resides in the Local Mapping Table which is found with in the SRAMin the adapter. See reference numeral 201 in FIG. 38.

7. When the receiving side processes the channel it reads the LMT anddescriptor pointed to by the LMT and gathers all information it needs toprocess the channel. A target of pull descriptor with the remote startflag bit set, causes a remote start request packet to be transmitted tothe channel identified in the descriptor. It expects to receive an echopacket indicating that the packet was received and later a responsepacket indicating that a valid source of pull descriptor was detected.

8. When the send side detects the remote start request packet itverifies that the packet has correct CRC fields, correct target physicalID, satisfactory time stamp, acceptable packet sequence number and sendsback an echo packet.

9. When the receive side detects the echo packet, it removes thematching remote start request packet from it's retry facilities andstops the associated time out monitor and retransmission mechanism.

10. The send side adapter examines the indicated channel's LMT entry anddescriptor list. It verifies that the operation can be performed andsaves the information contained in the remote start packet identifyingthe receive side channel and adapter LID (Logical ID). A remote startresponse packet is generated only if it cannot perform the operation. Ifthe operation can proceed it behaves like it would have if it hadreceived a local start message command. It either starts operating thechannel immediately or schedules it for later processing by placing thechannel number in one of two work pending lists

11. When the sending side operates the channel it reads the LMT entryand the descriptor to which it points. It gathers all the information itneeds into working registers including address translation anddescriptor entries plus any translated real addresses it may later needplus status information modified during the sending process such numberof bytes remaining to be sent. The adapter periodically exchangesinformation between these registers and the LMT to process othernon-related activity. The LMT thus serves as a level of cachingeliminating the need to refetch descriptors and/or TCE's from mainmemory.

12. The sending side sequentially transmits as many pull request packetsas needed to transfer all the data indicated in the descriptor list. Thesender expects to receive an echo packet for every request packet sent.It also expects to receive a response packet after the target hasprocessed all of the data associated with a single send side descriptor.A failure to receive an echo within a time out period causes packetretransmission perhaps over one or more alternate paths. A failure toreceive a response within a second time out period or a failure torecover from a series of missing echo's causes the descriptor to bemarked as unsuccessful due to a connection failure. An individual packetcan only include data from a single descriptor.

13. When the receive side detects a pull request packet it verifies thatthe packet is has correct CRC fields, correct target physical ID,satisfactory time stamp, acceptable packet sequence number and sendsback an echo packet.

14. When the send side detects an echo packet, it removes the matchingpull request packet from its retry facilities and stops the associatedtime out monitor and retransmission mechanism.

15. After sending an echo packet, the receive side adapter examines theindicated channel's LMT entry and descriptor list. It verifies that theoperation can be performed, saves the data portion of the packet inmemory and updates working registers originally obtained from the LMTand descriptor. As individual receive side descriptors are exhausted,they trigger a local processor interrupt on the receive side or mayrequest a remote processor interrupt to be triggered when the send sidedescriptor is exhausted. The receiving adapter should always havesufficient resources to move the data it receives to local memory. Ifbusy, it may do so slowly, but it can not stall for an indefinite periodwithout making progress.

16. As each packet is received, the adapter verifies that all contain anidentical descriptor sequence number and each contain a data sequencenumber one greater than the previous. A failure results in reporting aconnection failure.

17. Eventually the receive side determines that it has received andprocessed all of the data for a given send side descriptor. It insuresthat all memory updates have completed and then updates the target ofpull descriptor condition code and byte count fields. It then transmitsa pull response packet back to the send side indicating that theoperation was (or perhaps was not) successful.

18. When the send side detects the pull response packet it verifies thatthe packet has correct CRC fields, correct target physical ID,satisfactory time stamp and sends back an echo packet.

19. When the receive side detects the echo packet, it removes the pushresponse packet from its retry facilities and stops the associated timeout monitor and retransmission mechanism.

20. When the send side processes the information in the response packetit updates the source of pull and generates a local processor interruptif necessary. If the send side does not receive the response within agiven time out period it records a connection failure completion code inthe descriptor.

See FIG. 35.

Remote Write Operation

1. Master and Slave software agree that a remote type of operation maybe performed. Master side software identifies the channels and the slavelogical ID value to be used. Slave side software sets up a channel,without a descriptor list, that defines the local memory area that isreferenced externally. This process may occur outside of the messagepassing architecture using some side band capability or may usepreviously established message passing parameters.

2. Master side software defines one or more remote write descriptors,each pointing to a region of local memory where hardware obtains data tobe transferred. Each descriptor identifies the channel and adapterintended to receive the data plus the buffer offset in the slave wheredata is placed.

3. Master side software issues a start message command supplying a localchannel ID value that it receives from the operating system when thechannel is created. The command invokes an MMIO store instruction withthe virtual address field set to the channel ID value.

4. Master side hardware uses the processor's address translation logicand page table to verify that the software task is authorized to issuethe command and directs the command to a specific message passingadapter. The translated real address value identifies the MMIO as astart message command, selects one message passing adapter, andindicates the channel number which that adapter should use.

5. The adapter receiving the start message command verifies that thecommand and the channel it references are valid. The adapter then eitherstarts processing the channel immediately or schedules it for laterprocessing by placing the channel number in one of the two work pendinglists. The channel's LMT entry indicates which list to use.

6. When the master side processes the channel it reads the LMT entry andthe descriptor to which it points. It gathers all of the information itneeds into working registers including address translation anddescriptor entries plus any translated real addresses it may later needplus status information modified during the sending process such numberof bytes remaining to be sent. The adapter periodically exchangesinformation between these registers and the LMT to process othernon-related activity. The LMT thus serves as a level of cachingeliminating the need to refetch descriptors and/or TCE's from mainmemory.

7. The master side sequentially transmits as many write request packetsas needed to transfer all of the data indicated in the descriptor list.Information is included in each packet enabling the receiver to identifythe first and last packets associated with an individual send sidedescriptor along with any flag bits set in that descriptor plus a bufferoffset value where the slave should place the data. The master expectsto receive an echo packet for every request packet sent. It continuessending additional packets only if it has sufficient resources to resendany packet it feels has not been echoed in a timely fashion. It alsoexpects to receive a response packet after the target has processed allof the data associated with a single master side descriptor. A failureto receive an echo within a time out period causes packetretransmission, perhaps over one or more alternate paths. A failure toreceive a response within a second time out period or failure to recoverfrom a series of missing echoes causes the descriptor to be marked asunsuccessful due to a connection failure. An individual packet can onlyinclude data from a single descriptor.

8. When the slave side detects a write request packet it verifies thatthe packet is acceptable (correct CRC fields, correct target physicalID, satisfactory time stamp) and sends back an echo packet. The echoonly indicates that the packet was delivered correctly. It does notimply that the receiver can perform the operation requested.

9. When the master side detects the echo packet, it removes the matchingwrite request packet from its retry facilities and stops the associatedtime out monitor and retransmission mechanism.

10. After sending an echo packet, the slave side adapter examines theindicated channel's LMT entry. It verifies that the operation can beperformed, saves the data portion of the packet in memory and updatesworking registers originally obtained from the LMT. The adapter, similarto the master side, periodically exchanges information between theseregisters and the LMT in order to process other non-related activity.

11. Eventually the slave side determines that it has received andprocessed all the data for a given master side descriptor. It thentransmits a write response packet back to the master side indicatingthat the operation was (or perhaps was not) successful. It transmits thepacket only if it has sufficient resources to resend it later if an echoisn't returned in a timely fashion.

12. When the master side detects the write response packet it verifiesthat the packet is acceptable (correct CRC fields, correct targetphysical ID, satisfactory time stamp) and sends back an echo packet.Again, the echo only indicates that the packet was delivered correctly.It does not imply that the information can be processed (althoughnothing, other than a hardware failure, can prevent processing aresponse type packet).

13. When the slave side detects the echo packet, it removes the writeresponse packet from its retry facilities and stops the associated timeout monitor and retransmission mechanism.

14. When the master side processes the information in the responsepacket it updates the remote write descriptor with the completion codedetermined by the slave side and may trigger a local processorinterrupt. If the master side does not receive the response within agiven time out period it records a connection failure completion code inthe descriptor.

See FIG. 36.

Remote Read Operation

1. Master and Slave software agree that a remote type of operation maybe performed. Master side software identifies the channels and slavelogical ID value to be used. Slave side software sets up a channel,without a descriptor list, that defines the local memory area that isreferenced externally. This process occurs outside of the messagepassing architecture using some side band capability or may usepreviously established message passing parameters.

2. Master side software defines one or more remote read descriptors,each pointing to a region of local memory where hardware places the datatransferred from the slave. Each descriptor identifies the channel andadapter intended to provide the data plus the buffer offset in the slavewhere data is obtained.

3. Master side software issues a start message command supplying a localchannel ID value that it received from the operating system when thechannel is created. The command invokes an MMIO store instruction withthe virtual address field set to the channel ID value.

4. Master side hardware uses the processor's address translation logicand page table to verify that the software task is authorized to issuethe command and directs the command to a specific message passingadapter. The translated real address value identifies the MMIO as astart message command, selects one message passing adapter, andindicates the channel number which that adapter should use.

5. The adapter receiving the start message command verifies that thecommand and the channel it references are valid. The adapter then eitherstarts processing the channel immediately or schedules it for laterprocessing by placing the channel number in one of the two work pendinglists. The channel's LMT entry indicates which list to use.

6. When the master side processes the channel it reads the LMT entry andthe descriptor to which it points. It gathers all of the information itneeds into working registers including address translation anddescriptor entries plus any translated real addresses it may later needplus status information modified during the sending process such numberof bytes remaining to be sent. The adapter periodically exchangesinformation between these registers and the LMT to process othernon-related activity. The LMT thus serves as a level of cachingeliminating the need to refetch descriptors and/or TCE's from mainmemory.

7. The master side transmits one read request packet to the target. Thepacket identifies the targeted channel number, amount of data totransfer and the initial buffer offset value. The slave channel'saddress translation table converts this to a real memory address value.The master side expects to receive an echo packet plus one or morepackets containing the requested data. It sends the request packet onlyif it has sufficient resources to resend the packet if it feels an echopacket has not been returned in a timely fashion. A failure to receivean echo within a time out period causes packet retransmission perhapsover one or more alternate paths. A failure to receive data within asecond time out period or failure to recover from a series of missingechoes causes the descriptor to be marked as unsuccessful due to aconnection failure. All of the requested data is delivered back to themaster side before the master starts processing the next descriptor inthe list. This serial operation restriction allows the slave LMT torecord information for only a single request. This is important giventhe fairly large amount of information needed to process remote reads.

8. When the slave side detects a read request packet it verifies thatthe packet is acceptable (correct CRC fields, correct target physicalID, satisfactory time stamp) and sends back an echo packet. The echoonly indicates that the packet was delivered correctly. It does notimply that the receiver can perform the operation requested.

9. When the master side detects an echo packet, it removes the matchingread request packet from it's retry facilities and stops the associatedtime out monitor and retransmission mechanism.

10. After sending an echo packet, the slave side adapter updates theselected LMT entry with the information received from the master side.The adapter should always have sufficient resources to at least do thisupdate without stalling indefinitely for unrelated activity to complete.It then either starts processing the channel immediately or schedules itfor later processing by placing the channel number in one of the twowork pending lists. The channel's LMT entry indicates which list to use.

11. When the slave side processes the channel, it reads the LMT entryand gathers all of the information it needs into working registersincluding address translation and descriptor entries plus any translatedreal addresses it may later need plus status information modified duringthe sending process such number of bytes remaining to be sent. Theadapter periodically exchanges information between these registers andthe LMT to process other non-related activity. The LMT thus serves as alevel of caching eliminating the need to refetch descriptors and/orTCE's from main memory.

12. The slave side sequentially transmits as many request responsepackets as needed to transfer all the data requested. It expects toreceive an echo packet for every response packet sent. It continuessending additional packets only if it has sufficient resources to resendany packet it feels has not been echoed in a timely fashion. A failureto receive an echo within a time out period causes packet retransmissionperhaps over one or more alternate paths. A failure to recover from aseries of missing echoes causes the LMT to be marked with a fatalconnection failure. After all the data is sent, the LMT clears theoperation from the LMT making it available for another operation.

13. When the master side detects a read response packet it verifies thatthe packet is acceptable (correct CRC fields, correct target physicalID, satisfactory time stamp) and sends back an echo packet. The echoonly indicates that the packet was delivered correctly. It does notimply that the information can be processed (although nothing, otherthan a hardware failure, can prevent processing a response packet).

14. When the slave side detects an echo packet, it removes the matchingread response packet from it's retry facilities and stops the associatedtime out monitor and retransmission mechanism

15. When the master side competes the transfer of all the data requestedto memory. It updates the remote read descriptor and advances to thenext descriptor in the list.

See FIG. 37.

Hardware Considerations Left Hand Side Macro (Logical Interface)

The so-called Left Hand Side logic, also referred to as the LogicalInterface 203 is broken out separately in FIG. 38 to illustrate that itis through this logic that the Interpartition Communication (IPC) macro204 is connected to the processor bus. In order to achieve thisconnection, the logic within the LHS accommodates an interface to IPC204 in addition to its register interface. This register interface isprovided through the SCOM ring which is shown in FIGS. 38 and in moredetail in FIG. 49. The LHS logic is broken into two blocks. The firstblock, which is the one that receives commands from the processor bus iscalled the From_Processor_Bus_Portion. This logic decodes the addressand determines where the command is to be forwarded. The possibledestinations are: a register within the adapter chip or the IPCmicrocode. In the case of a register within the adapter, the bus commandis placed on the internal register ring called the SCOM (ScanCOMmunication) ring. See FIGS. 38 and 49. Finally, in the case of anaddress corresponding to the local DMA logic, the bus command isforwarded to the DMA logic directly. The logic block that transmits datato the processor bus is called the To_Processor_Bus_Portion. This logichandles the transmission of data onto the processor bus from the SCOMregister ring and from the IPC.

Media Access Controller (MAC)

The Media Access Controller (MAC) (reference numeral 211 in FIG. 38)provides the adapter with a connection to the LDC (Link Driver Chip—seereference numeral 230 in FIG. 40). This implements the link levelprotocol to communicate with the switch fabric including the reliablephysical layer connection from end-to-end (node-to-node) of flitgranules of data. (As used herein, the term “flit” refers to thesmallest amount of data that is passed through the fabric of theswitch). There are two ports in the current adapter design, so there aretwo instances of the MAC logic. The MAC transmits packets using virtuallanes. The concept of virtual lanes is that different “virtual” lanes oftraffic are evenly multiplexed over a single “real” lane. In the case ofthe current implementation, eight virtual lanes are transmitted over asingle real interface. Each of the virtual lanes has its own flowcontrol mechanism, so that if one of the lanes gets backed up, it doesnot affect the flow of the other lanes. The MAC is split into a sendblock and a receive block. The interface between the adapter logic andthe send block consists of a single data interface with a sidebandcontrol interface to indicate the virtual lane over which the data istransmitted. The interface between the adapter logic and the receiveblock comprises eight data interfaces corresponding to the eight virtuallanes.

MAC Arbiter Macro

The Media Access Control (MAC) Arbiter 210 is comprises two portions: asend block and a receive block. Each block is designed for minimallatency. The send block arbitrates between eight virtual lanes foraccess to the two send MACs. Even though the Send MAC transmits the datausing the virtual lane concept, the input port is a single interfacewith a sideband control interface which indicates which virtual lane onwhich the data is to be sent. The smallest unit of transmission into theMAC block (macro) is a flit, which is currently designed for 32 bytes.The arbitration is programmable so that the lanes which transmit NUMA(non-uniform memory architecture) traffic can be set up to arbitrate ona packet basis (a single NUMA packet is up to 5 flits) and the lanescarrying DMA traffic can be set up to arbitrate on a single flit basis.The Receive portion of the MAC Arbiter block 210 presents the trafficfrom all eight virtual lanes simultaneously over eight interfaces. Thereis a receive arbitration block on each separate virtual lane. This logicarbitrates on a packet basis between the two incoming signal lines fromMACs 211. See FIG. 38.

Time of Day (TOD)

The Time of Day functional block 220 provides a mechanism for packetidentification and cross-network data synchronization. The Time of Daylogic 220 is provided separately herein so that it is easily shared withother portions of the adapter design. It includes a Time-of-Dayregister, used to time stamp packets, a synchronism mechanism tomaintain a common value in all TOD registers in all adapter chips withinthe system, plus a Reference Clock generator used by the node to keepall node timer facilities consistent within the entire system

Service

The Service buffer 208 is simply a 40 byte register that is written toor read directly by a processor as an entity within the chip's addressspace. The service logic uses one of the virtual lanes for transmissionacross the switch links. Even the route code for the service packet iswritten in by the processor. The result is that a service packet isalways a single 32 byte flit.

Transport Macro

The adapter Transport Macro (TM) is a pluggable entity that implementsthe transport layer for a single virtual channel across the switch.While the MAC guarantees point-to-point in-order delivery over a cablebetween two link ports, the Transport Macro guarantees end-to-endin-order delivery of data, potentially across multiple switches. Thefunction of the Transport Macro is very similar to that of the overalladapter macro, but the Transport Macro does not have any constructsspecific to the transmission of processor bus commands. An example of abus specific construct is the Request buffer within the adapter macro.This buffer is used to record processor bus requests sent over theswitch link. When the associated response returns, the entry within theRequest buffer contains the bus tag for the response when it is put onto the processor bus. The Request buffer is not in the Transport Macro.Any operations specific to the protocol transported by the TransportMacro (such as the DMA protocol) are the responsibility of the logicdriving the Transport Macro. The Transport Macro in-order reliabledelivery of packets by assigning an incrementing sequence number to eachpacket and transmitting that number with the packet. At the receivingside, if the packet is received correctly and the sequence number is thenext one expected, then an acknowledgment packet is sent back to thesender. At the sender, if an acknowledgment packet is not received for apacket within a time out period, then the attached protocol engine (thatis, the IPC) is notified to retry the packet. See FIG. 38.

Route/Path Table

While each copy of the Transport Macro logic 205 independentlyimplements a single virtual lane, they each have access to a set ofcommon functions. These functions include the Timer macro and the RouteTable 206. The Route Table is used only by the copies of the TransportMacro. Thus, in the current adapter design, access to the route tableinvolves arbitrating between two Transport Macros. The logic is designedso that it can handle arbitration of up to three Transport Macros. TheRoute table contains control information that is common between all ofthe Transport Macros. This includes the switch route codes, and currentpath values for up to 1,024 end points in a system, the physical nodenumbers for all of the end points in a system, and the physical nodenumber of the adapter chip within the system. So that the changes to theadapter logic are minimized, the adapter macro only uses its own Routetable, which addresses up to 64 end points (8 nodes with 8 adapter chipseach).

Interpartition Communication Facility (IPC)

One of the primary functions of the adapter chip is to provide datamovement services for message passing protocols such as IPand MPI. Itdoes this by providing hardware to move data between the server 's mainmemory and the link through the switch. DMA packets are constructed bythe Interpartition Communication facility on the chip, and are up to 2Kbytes in size in the current implementation. The protocol by which theupper level software layers communicate the data movement instructionsto the hardware is called the DMA Protocol Architecture and is describedin detail elsewhere herein. In short, the DMA implements a large numberof independent software windows which are assigned to differentapplications. Each window has a corresponding structure in main memorycalled a descriptor list which is a linked list of work items. Atinitialization, an MP (message passing) application is assigned a numberof windows. When the application wishes to send some data over aparticular window, it builds a descriptor list entry with the necessaryinformation about where to get the data from (local address), and whereto send the data to (destination node and window number). Theapplication then accesses a control location on the adapter chipcorresponding to the subject window. This action is called ringing thedoorbell for the window. If the DMA engine is free, it fetches thedescriptor element for the window and executes the movement of data fromthe specified local memory location to the specified window on adestination node via the switch links. If the DMA engine is not free,the request to move data is queued. All “receive operations” using theadapter are preposted. When an application is going to receive data overa particular window, it builds a descriptor list entry with thenecessary information about where to put data received in on thatwindow. When a packet is received in over a switch link, the DMA enginefetches the next descriptor element for the window specified in thepacket header, and executes the movement of data from the switchinterface to the specified location in local memory. In the past, themessage passing adapters for the RS/6000 servers have been implementedwith an embedded microprocessor and associated onboard firmware. Thisapproach allowed for a flexible method of offloading from the mainprocessor the task of data movement to and from the switch. With thenewer design, the link bandwidth is increased over the previousgeneration by a factor of four and the number of processors in a node isdoubled. Using an “off-the-shelf” embedded microprocessor is not able tosustain the traffic capable of being passed over the new processor bus.Designing hard coded state machines would satisfy the speed requirement,but would not be flexible enough to easily modify. The design pointchosen for the present adapter chip is called the InterprocessorCommunicator (IPC) and is a hybrid between a microprocessor and a statemachines. The core of the IPC is an optimized instruction processor thatexecutes embedded firmware to support message passing levelfunctionality. It is composed of a 64-bit ALU (arithmetic and LogicUnit) with an associated sequencer and a hardware dispatch unit thatimplements 16-way hardware multithreaded operation. This means that upto 16 tasks can share execution time on the ALU, and the swappingbetween tasks is controlled by a hardware unit. Because it is aprogrammable element its functionality is modifiable. It also implementscomplex recovery functions difficult to achieve in a pure hardwaresolution. The function of a task is to move a packet of data accordingto the instructions contained within a descriptor element. Within theIPC there are buffers in which the packet headers are contained andmanipulated, and data buffers through which the data portions of packetsare either gathered or scattered. Programmable data movers support thesequencer in moving data in/out of the buffers. The instructions for theIPC are contained on chip in a small on-chip 16 KB SRAM (around 16kilobytes). The control store for the software windows is called thelocal mapping table (LMT), and is contained in 8 MB of SRAM external tothe adapter chip, but on the same logic card. This amount of memory isenough space for 16k windows plus additional paging space for the IPCinstruction store.

Link Driver Chip

The LDC, or Link Driver Chip, provides the physical connection to theswitch links. This design also allows versions of cards to be built thatconnect to other physical link technologies such as fiber-optics. SeeFIG. 40.

Microcode Sequencer-Issued SCOM (Scan COMmunication) Ring Requests

The Sequencer has the ability to issue SCOM requests through theIPC_SCOM. The sequencer has the same rights as the CSP (ConvergedService Processor) (bit 7 of the SCOM control word is “1”). When thesequencer issues an SCOM request, it drives either scom_write orscom_read high for one cycle, and puts the target address onscom_address during the same cycle. The IPC_SCOM unit handles thisrequest immediately if it is idle, or at the end of the current requestif it is currently processing a request. When IPC_SCOM finishes the SCOMrequest on behalf of the sequencer, it sets scom_done high for onecycle, signifying that the sequencer is free to issue another request.The sequencer is on its honor not to issue more than one scom request ata time—if the sequencer attempts to issue more than one request at atime, no guarantee can be made that both requests are fulfilled (onerequest may be lost). The source/target of all scom requests thesequencer issues is register 0 of the Global Register High file (GRH0).Therefore, on an scom_write, IPC_SCOM reads GRH0 through the sequencerservice unit, then issues an SCOM request on the scom ring (if thedestination register is not local), and uses the data it read from GRH0as the data to be written. When IPC_SCOM receives the write done SCOMresponse, it sets the scom_done signal to notify the sequencer theoperation has completed. Similarly, on an scom_read, IPC_SCOM reads theappropriate SCOM register (either through the ring, or by reading alocal register), then writes the data into GRH0 through the sequencer'sservice port. When the service port transaction has completed, IPC_SCOMdrives scom_done high for one cycle to signify that the transactioncompleted. A flowchart is shown in FIG. 37.

AMAC Adapter Trace Memory

A portion of the Adapter Memory is preferrably configured to function asa trace FIFO queue for microcode. The register which defines this areais the AMAC (Adapter Memory Access Controller) Adapter Trace MemoryRange Register. When the microcode writes to the AMAC Adapter TraceMemory Access Register, IPC_SCOM causes a service access to the AMAC.Consecutive writes by the sequencer cause successive writes into Adaptermemory, wrapping back around to the beginning of the Adapter TraceMemory range. For instance, if the Adapter Trace Memory Range Registeris set to “0×00,” then the first 16 doublewords of Adapter Memory isused for the sequencer's trace area. The first write by the sequencer tothe Adapter Trace Memory Access Register writes into address 0, thesecond to 1, etc., wrapping around after 16 writes.

Time of Day

TOD Slave Mode

The slave checks its TOD value with the master's value from a receivedbroadcast to see if there is a discrepancy. If so, a slave corrects itsTOD value accordingly.

TOD Value

The slaves read the broadcast packet from the MAC 211 (Receive side).The broadcast packet format is the same as the broadcast sent from themaster. In between broadcasts, the slaves simply increment their TODvalues whenever there is a rising edge on the clock (running at 75 MHzin the currently preferred embodiment). When the tod_control_valid_outsignal line from the MAC 211 (Receive side) goes high, a slave comparesthe TOD value from the broadcast to its own. If it is the same, thenthis slave is already in sync with the master, and does nothing. If theTOD value from the broadcast is higher, the slave loads it into its ownTOD value. If the TOD value from the broadcast is lower than its own,the slave loads the value from the broadcast into a copy calledtod_compare. It then increments the tod_compare at full speed and itsown TOD value at half speed (every other 75 MHz edge in the currentembodiment) until the TOD value is equal to tod_compare. It is notdesirable to simply load a lower TOD value because the TOD value wouldgo “backwards” in time. This would confuse packets that depend on a timestamp. An exception to this final case is when the software update bitis high on the TOD control packet. In this case, the broadcast value isalways loaded into the slave TOD register. After a slave has receivedits first valid broadcast (see Filter below for definition of validbroadcast), if it misses too many broadcasts, it sets its TOD value toinvalid (bit 0=“0”). This is because, if a slave misses too manybroadcasts, it has not been adjusted for any drift, and cannot guaranteethat its TOD value is still valid. The number of broadcasts after whicha slave sets its TOD to invalid is determined by the software registertrigger_bcasts_missed+1, which defaults to 22 broadcasts (16hexadecimal). (In this example, the logic takes the appropriate actionson the 23rd missed broadcast.) If a slave mode adapter has an invalidTOD, it sets an error bit called tod_inval_err. In addition, themp_avail signal to the message passing logic is cleared (but not themp_avail register bit).

If the 75 MHz oscillator fails, and the enable bit in the tod_genregister is high (no_(—)75 mhz_osc_er_en, register 0×21030), then theadapter also sets its TOD bit to invalid (bit 0=“0”). This also causesthe LEM (Local Error Macro) bit for the no_(—)75mhz_osc_err signal lineto go high. This does not clear the mp_avail signal, because messagepassing logic can still run in a satisfactory manner. If it is a slavemode adapter, then the TOD is updated when it receives a broadcast fromthe master, thus creating a “coarse” TOD value. If it is a master modeadapter, then the TOD bit is set to “clear,” thus causing other slavesto miss broadcasts, and causing another adapter to take over as master.Then, this adapter subsequently becomes a slave. For a completedescription of the master/slave recovery scenario, see below.

Filter

It is very desirable to insure that the Time of Day (TOD) packets fromthe MAC are good. Since there are two MAC ports, it is also desirable toarbitrate between both. First, the following checks are performed on thebroadcast from each MAC port, then, the packets from the MAC port whichpasses the tests is chosen. If both MAC ports pass, then port 0 ischosen. The result is redriven to both MAC send ports.

-   -   The broadcast should have good parity on both the TOD value        packet and the TOD control packet.    -   The TOD_valid bit (bit 0) must be equal to 1 (Otherwise, this is        an invalid TOD)    -   The master id from the broadcast should be “greater” than or        equal to its own m_id_copy    -   The control packet should contain a sequence number which is        different from its own copy. If the sequence number is the same,        then this means that the slave already received this broadcast        and that the broadcast is rejected. The exception to this rule        is if the master id from the broadcast is greater than the        m_id_copy. In this case, the sequence number is ignored.

The final broadcast packet seen by the rest of the logic is contained inthe internal facilities eff_tod_ctl_valid, eff_tod_ctl, and eff_tod(“Eff” stands for “effective”). For timing purposes, these facilitiescontain the appropriate MAC data 1 cycle after it appears on the MAC.

If neither MAC port passes the filter tests, the TOD logic counts thebroadcast as a missed broadcast, and the rest of the logic acts asthough no broadcast was sent The broadcast is not redriven to the MACsend ports in this case. The error bit bad_tod_packet_err is set when abroadcast is missed due to parity errors.

TOD Recovery/Failover

A recovery mechanism is provided in the event that a node or an adapterchip on the node which is configured as the TOD master goes down. Thefailover mechanism possesses the following aspects:

-   -   1. The slaves configured as the backup are provided with the        ability to take over as master for their respective switch        planes.    -   2. “Stale masters” (that is, master nodes which fail, but then        come back online still configured as master nodes) are provided        with the ability to know that they are stale and to thus        relinquish control.    -   3. A mechanism is provided to assign a new backup node when the        new master takes over.    -   4. If the backup slave goes down before the master, an alternate        backup is provided. The responsibility for detecting that the        masters have gone down rests with the backup slaves. If a master        has gone down, then it cannot be trusted with this        responsibility. Additionally, if only one adapter on a master        node goes down, the entire node relinquishes control as the        master, since the adapter chips on a node are all in either the        master mode or all are in the slave mode. A backup slave node        takes over as the master when any of the adapters on that node        misses too many broadcasts. This value is less than the trigger        value for determining that too many broadcasts on a slave        adapter have been missed (trigger_bcasts_missed, in register        0×21030) and in this case, the local TOD value can no longer be        trusted. This is because an adapter with an invalid TOD value        should not be the new master. At initialization, software        chooses a node destined to function as the TOD master, and sets        a register (bckup_or_mas_id, in register 0×21030) on each        adapter chip on that node to the same initial value. (The exact        value is left to the discretion of software.) This is the        initial master id. On the first broadcast, the slaves load in        this value from the TOD broadcast control packet, and keep it as        m_id_copy.

Software chooses up to seven nodes to be backups at initialization bysetting a backup enable bit (bckup_en, register 0×21010) and assigning abackup id to each node (bckup_or_mas_id, register 0×21030). The backupid is selected to be “higher” than the current master id, takingwrapping into account. For example, a backup id of “1” is “higher” thana master id of “E” (hexadecimal). Hardware limits the wrapping to arange of 7 backups. Therefore, an id of “D” is “lower” than an id of 5,since only 7 backups are allowed. Each switch plane has a hierarchy ofseveral backups. For example, if the current master_id is “0,” softwareassigns nodes to backup ids of 1, 2, 3, etc. When an adapter on a backupnode misses too many broadcasts, it takes over as master, and sets themaster id on its outgoing TOD broadcast equal to its own backup id. Thenew master also sends a signal (takeover_out) to the other adapters onthe node (in different planes) to tell them to take over as master ontheir respective planes. This signal is driven low for about 100 corelogic cycles, which causes all of the takeover inputs to the otheradapters on the node to be driven low as well. This is to preserve theuniform master/slave configuration, since adapter chips on a node areeither all master or all slave for their respective planes. (Note: ForPass #2, an adapter takes over as master when its takeover_in input isdriven low, but only if it is enabled as a backup. For Pass #1, theadapter takes over when takeover_in is driven low, even if it is notenabled as a backup.) The slaves, in turn, only accept a broadcast witha master_id value that is “higher” than its own m_id_copy, assuming agood broadcast under other conditions. The slaves then load their localcopies (m_id_copy) with the new master_id value. If a stale master triesto send a packet, the slave sees the “lower” master_id value and rejectsthe broadcast. Once again, when determining whether or not the master_idfrom the broadcast is “higher” or “lower,” wrapping is taken intoaccount. A master_id of “1” from the broadcast is “higher “than amaster_id copy of “E” (hexadecimal). A master_id of “D” from thebroadcast is “lower” than a master-id copy of “5” since “D” is out ofthe range of 7 backups. Meanwhile, the master continually checks its MACReceive ports to ensure that it is not a stale master. If the master_idvalue from the broadcast is “greater” than its own, it realizes that itis a stale master, and therefore is to become a slave. If it seesnothing, or possibly its own packet, then it continues normal operation.A backup node determines how many missed broadcasts to wait beforetakeover using the value set forth in the equation below. The number ofbroadcasts to wait is determined by a register called init_trig_takeov(number of broadcasts to wait before the first backup takes over), andthe difference between the backup id and the current master id. Table 34below shows an example which uses this equation.takeover_trigger=init_trig_takeov+2×(bckup_or_mas_id−m_id_copy−1)

EXAMPLE Current Master id is 05, Initial Trigger is 10 Broadcasts

Using Table 34 below as an example, suppose the initial trigger is 10broadcasts. (The first backup, whose id of “6” is only one more than themaster_id “5,” waits 10 broadcasts before taking over as master.) Thebckup_or_mas_id is “7,” and the current master_id is “5.” This backupwaits for 12 broadcasts before taking over, because:takeover_trigger=10+2×(7−5−1)=10+2×1=12.

Therefore, if the backup with id number “6” goes down before the mastergoes down, backup “7” takes over. The actual switch to master mode takesplace one broadcast after the takeover_trigger. For example, if thetakeover_trigger=10, then the takeover occurs on the 11^(th) missedbroadcast. TABLE 34 Number of broadcasts to wait vs. backup ID (example)Backup_or_mas_id Broadcasts 6 10 7 12 8 14

The bckup_or_mas_id is also used to detect if an adapter is a stalebackup (that is, this backup adapter failed, and a backup adapter with ahigher id took over as master.) Using the example from Table 34 above,if backup adapter “6” comes back online after backup “7” took over, itrealizes that it is a stale backup by comparing its backup id of “6”with the new master_id of “7.” Since the new master_id of “7” is greaterthan “6,”backup adapter “6” turns off its bckup_en bit, updates itsm_id_copy value to “7,” and becomes a non-backup slave adapter. Softwareacts to continually ensure that enough backups per plane exist such thatthere is always a backup to the current master.

A backup slave switches to a non-backup slave if a parity error occursin the incoming broadcast or if the link is down. If there is a problemwith the link on this adapter, then it cannot be trusted to potentiallybecome a master. If a node takes over as master, each adapter sets itsbekup_en bit to “0.” This prevents unintended backup slaves if themaster should subsequently become stale. An adapter sets an error bitcalled master_rec_err (master recovery error) whenever the adapterchanges mode for hardware reasons. Any of the following conditions causethe master_rec_err bit to be set if it occurs after the first broadcast:

-   -   1. A backup takes over as master.    -   2. A master switches to slave mode because it is stale.    -   3. A backup slave switches to non-backup slave because it is        stale, because a parity error occurred on the incoming        broadcast, or because the link is down.

Auto Tracking of Bad Paths Retry Algorithm

There are 3 basic reasons why a message times out and should be retried:

-   -   1. The sent packet never makes it to the destination;    -   2. The sent packet makes it to its destination but the        destination cannot handle it; and    -   3. The packet makes it to its destination and the destination        responds but the echo doesn't make it back.        Two of these problems are dependent on the path (route) traveled        and is often corrected by changing paths. When the first        time-out occurs, in order to resend this message, the protocol        macro is notified with a tag and reason code. The entry that has        timed-out remains at the head of the list. This means that no        other entries can time-out regardless of their time stamp since        they won't be checked. Other entries can be retired as echoes        continue to come in by removing them from the linked list which        is maintained in an array in Transport Macro 205. Other entries        for this path can't be retired since their echoes (if they come)        are out of order because of the missing one that timed-out.        Entries for other paths can be added but it is recommended that        this not be done and it is not expected that it is done.

The protocol macro reissues this packet, marking it as a resend. TheTransport Macro then realizes that the retry entry for this packet is atthe head of the list and simply reuses it by updating its time stamp.The packet is resent using the same sequence number and retry index byretrieving this information from the retry entry. It is sent along thesame path for a second time in order to determine if the path has a hardfailure. The head of the list is checked again and if it times out againthe Transport Macro notifies the IPC a second time. When the protocolmacro resends again, the Transport Macro's request to the path tablealso requests the path be changed. Again the entry in the retry table isreused and the time stamp refreshed. This continues until either thepacket is successfully sent such that an echo retires this retry entry,or when attempting to send, the path table responds by indicating thereare no more paths to try for the second time resulting in a connectionfailure (see above).

In the case where the resend is eventually successful and the retryentry is cleared the next oldest, entry appears. This entry will mostlikely instantly time-out and require a resend also. The same process asabove starts again except that this time (hopefully) the current pathworks on the first try. If this one is successful, then the next oldestpops up and is dealt with in the same manner. This process has“serialized” the recovery to this “broken” destination. This is slowerthan what would otherwise occur if the original problem where atemporary, one-shot glitch, but if the problem is more severe then thismethod prevents resending extra traffic that is destined to fail.

Because the protocol macro knows when a retry is in progress, it is thecase that it won't request the sending of any new packets to thisdestination. Packets to other targets can continue to flow. If newpackets are sent to the recovering target while recovery is still inprogress, they may happen upon a current path that is now working. Inthis case they die with an out-of-order sequence number at the receiver.

In the case where no paths have been successful and the path tableresponds with a no_path error, the retry entry is purged from the tableand the protocol macro is notified that the packet didn't make it andthat it is not worth trying again. The notification is a reason code of“no paths available” meaning “connection failure.” The sequence numberfor this target ID in the send seq#table is reset to a value of “FF”(hexadecimal). As in the other case, the next oldest entry now rises tothe top and also meets with the path error response. The protocol macrois again notified in the same way.

If the protocol macro decides to try this target ID again, the FTM usesthe “FF” sequence number which indicates that the send processor needsto “sync” this destination so that it holds up any subsequent sendrequests until the synchronization operation is successful. If the syncpacket should time out, the send processor may need to purge any pendingsend requests in the send buffer in order to get a resend for the syncpacket through. When the send buffer is purged (dropped until the nextresend) a response is returned to the protocol macro for each abortedpacket indicating a “fail to send” error code.

NOTE: Most of this function is provided in SEND processing logic. Theretry logic simply supports the send logic's operations for resendingand synching packets.

Formatter

The Formatter unit is a hardware accelerator see FIG. 47 for the rapidformation of packet headers and completion messages. It performs highthroughput modification and nibble level merging of bytes from varioussource buffers and arrays (a nibble is half of a byte). The formatter isa programmable engine slave device, which executes formatter scriptsthat are held in a script ram within the formatter unit Sequencerfirmware. Formatter scripts cooperate to construct packet headers andcompletion messages. To do this, a sequencer pipelines one or moreformatter commands to the formatter unit, each of which specifies asequence of scripts to execute.

The formatter unit is fully pipelined and executes one script per cycle(when there are no buffer access conflicts). Each script operates on an8 or 16 byte chunk of some source buffer or array. When a command isreceived, the formatter starts fetching consecutive scripts and chunksfrom the source buffer. As each script and buffer section reach the headof the formatter pipeline, the source buffer bytes are scattered andmerged into 16 different byte locations within a 128 byte assemblybuffer within the formatter. A nibble mask is specified in formatterscripts for each of the 16 possible source bytes. Furthermore, theentire source can be rotated left by one nibble before the mask andmerge. Thus, each source byte is merged into the assembly buffer bytetarget on a nibble basis (that is, upper nibble only, lower nibble only,both or neither). The internal organization of the formatter is shown inFIG. 44.

The assembly buffer is composed of eight rows of sixteen byte registersthat can be written nibble wise. Formatter scripts specify assemblybuffer locations as a row and column byte target, as shown in Table 35below. TABLE 35 (Formatter Script) Bits Size Name Description 0:2 3Source 000 = channel buffer 0 001 = channel buffer 1 010 = header buffer011 = eserved 100 = task register low file 101 = global register lowfile 110 = global register high file 111 = global parameter ram 3 1Chunk 0 = eight bytes Size 1 = sixteen bytes 4:7 4 rsvd Reserved  8:15 8Source Source Offset in 8 byte units Offset 16:31 16 Nibble Rotatecorresponding byte Rotate left by one nibble 32:63 32 Nibble NibbleMasks [16][2] Masks  64:191 128 Byte Assembly Buffer Targets [16][8]Targets Target bits 6:4 = Assembly Buffer Row Target bits 3:0 = AssemblyBuffer Column

Each assembly buffer target is written independently in any given cycle.The Nibble Masks provide a means of specifying which halves of thetarget byte are to be modified (or if the target byte should be modifiedat all). A script specifies the source of the data to be operated on bythe script, the size of the chunk to be fetched from the source, and ifany of the source bytes should be rotated left by one nibble beforescattering and merging it into the assembly buffer. When a nibble rotatebit is set, the upper and lower halves of the source byte are swapped.When the source is a header or channel buffer, the chunk size is 16bytes and the source offset is on a 16 byte boundary. For other sourcesthe chunk size and source offset can be either 8 or 16 bytes. In anycase, the first eight bytes from the source are always aligned to theupper half of the formatter pipeline. Furthermore, a formatter scriptalways operates on a full 16 bytes regardless of the source chunk size.Hence, for 8 byte chunks, the lower 8 nibble masks should be zero.

Formatter command syntax is shown in Table 36 below. A formatter commandspecifies a starting script index and the number of scripts to execute.Header and Channel buffer sources and destinations are specified in twoparts. The buffer to be used is specified in the script. The buffer slotis specified in the command (and applies to all the scripts associatedwith that command). CB Handle (that is, the Channel Buffer Handle)specifies a 256 byte offset from the base of the channel buffer (thatis, channel buffer slot). HDB Handle (that is, the Header Buffer Handle)specifies a 128 byte offset from the base of the header buffer (that is,header buffer slot). When the task register file is specified as asource in a script, the register file window (64 bytes) associated withthe Task ID in the command is accessed.

Typical usage of the formatter starts with a sequencer issuing asequence of formatter commands that gather bytes from various sources,and merges them nibble wise into the assembly buffer. While theformatter is performing this task, the sequencer generates thesynthesized header or completion message components in its registerfiles. When it is finished, it issues one last formatter command thatmerges the synthesized components into the assembly buffer and thenwrites the assembly buffer contents to a destination buffer (that is, toa header or channel buffer). TABLE 36 (Formatter Command) Bits Size NameDescription 0:7 8 BT Handle Source Header Buffer Handle for block CBHandle transfers  8:15 8 Task ID IPE Task ID 16:23 8 CB Handle Source orDestination Channel Buffer Handle 24:31 8 HDB Handle Source orDestination Header Buffer Handle 32:33 2 Destination 00 = channel buffer0 01 = channel buffer 1 10 = header buffer 11 = no transfer 34:37 4 XferSize Length of transfer from the assembly buffer to the Destinationbuffer (in 8 byte units, 0 = 16). 38 1 Header 0 = normal formattercommand Block 1 = transferXferSizefromassembly Transfer . . . buffer orBT Handle to HDB Handle 39 1 Clear 0 = don't clear assembly bufferAssembly 1 = clear assembly buffer Buffer 40:47 8 Destination Offset indestination buffer slot in 8 byte Offset units 48:55 8 Script IndexStarting Script Buffer Index 56:63 8 Script Len Number of ConsecutiveScripts to Execute

The format of read requests the formatter issues to the IPE is shown inTable 36 Each request is for a single eight byte quantity, aligned on aneight byte boundary. The IPE queues up to eight requests, to facilitatepipelining and to smooth out accesses when there is contention. Addressgeneration is illustrated in the IPC Arrays Interface section. See FIG.50. Note that the sequencer global register files are accessible by theformatter. However, before a newly dispatched task updates them (or thepart of them that firmware policy sets aside for this purpose) itverifies that the formatter has finished reading the contents, bychecking the extended condition code provided for this purpose.

Except for the last command in a sequence, firmware can generate aformatter command (that doesn't push the assembly buffer out to adestination buffer) in one 32-bit immediate instruction. Sequencerhardware inserts the Task ID, CB Handle, and HDB Handle into thecommand. To push the assembly buffer out to a specified destination,firmware specifies a destination offset (the offset from the base of thedestination buffer or buffer slot), the transfer size. Any part of theassembly buffer is written out in eight byte units. Firmware alsospecifies whether or not the assembly buffer is cleared (that is, set toall zero's) before processing a command.

Formatting is done on behalf of one sequencer task at a time. However,formatter hardware does assist in the synchronization required betweentasks. Firmware is only required to check for formatter request queuefree space and to verify that the formatter is done reading the part ofthe global register file(s) the formatter is accessing. Furthermore, thelast formatter command issued before a task suspends itself invokes awrite back of the assembly buffer. Hence the formatter processes all thescripts for one task in a group, potentially pipelining the groups backto back.

The formatter provides synchronization support in two areas. First, itstalls the pipeline when necessary, for the number of cycles required toavoid assembly buffer overrun (by commands from another sequencer).Secondly, it drives the id of the task that issued the currently pendingcommands on the response output associated with the sequencer thatissued those commands (and an inactive code of 0×FF when idle). Thepacket mover and data mover stall requests with the same task id as thepending commands in the formatter. Since firmware interlocks on theformatter such that only commands from one task per sequencer are everpending in the formatter at a time, active response outputs are alwaysguaranteed to correspond to those tasks. Note that in a multi-sequencerimplementation, separate request and response ports are provided foreach sequencer. The packet mover or data mover then block request queuesthat match the task id on the corresponding response port.

When the formatter receives the first formatter command in a sequence ofcommands, it initiates processing in a three-stage pipeline: scriptfetch, source fetch, execute. In the execute stage the sixteen sourcebuffer bytes are rotated and then aligned to the assembly buffer columntarget specified in the formatter script. Then the row targets, nibblemasks, and aligned source buffer bytes are broadcast to all eight rowsof the assembly buffer. Each byte target in each row contains a rowtarget comparator and nibble mask gate. If the row target matches, thenibbles passed by the nibble gates are written to the target byte.

The formatter also supports a Header Block Transfer operation. When thisoperation is specified, the formatter checks to see if no scripts wereexecuted since the last time the assembly buffer was pushed out and ifthe header buffer/slot to which it was pushed was the sane as thatindicated in BT Handle. If so, the assembly buffer is pushed out toheader buffer slot specified in HDB Handle, and no scripts are fetchedor processed. If not, the formatter command is executed normally, withthe exception that the BT Handle is used as the source HDB Handle. Notethat block transfer requests assume that Destination Offset is zero.

The formatter pipeline runs without bubbles as long as there is nocontention reading the source buffers. The IPE path is only half thewidth of the path to the channel and header buffers. Hence, theformatter pipeline only runs at half speed when the source buffer is inthe IPE. There is an 8×16 byte read data queue on the IPE read data portwhich is used to assemble the eight byte chunks fetched from the IPEinto the 16 byte input units the formatter pipeline expects. Thepipeline also stalls during the time that the assembly buffer is beingwritten out to the destination buffer. The formatter controllerminimizes pipeline stalls by initiating script and source buffer fetchesprior to the entire assembly buffer being written to the destinationbuffer. The formatter script ram can be read or written by host software(or service processor) through the service port. Single eight bytetransfers are supported.

Microcode Sequencing of Packets

In another aspect of the present invention, microcode is uses thedescriptor sequence number, the data sequence number and a pull sequencenumber to ensure the in-order delivery of data packets.

When a Target of Pull descriptor is read, the microcode sends a RemoteStart Packet to the other side in order to initiate the transfer. Inthis packet, the microcode sets a Pull Sequence Number. The microcode onthe target side then accepts no packets that do not have a pull sequencethat matches this value until this descriptor is complete.

On the remote (source) side, upon receiving the Remote Start Packet, themicrocode there starts sending data from the Source of Pull descriptor.It keeps sending data until it has sent all of the data that wasrequested by the Remote Start Packet. This typically involves multipleSource of Pull descriptors due to the way that it is used as a “gather”mechanism by the protocol. Each packet includes several sequence numbersand flags. The Pull Sequence Number should match that of the RemoteStart. The Descriptor Sequence Number is a monotonically increasingcounter that increments whenever a new descriptor is used. The DataSequence Number is a monotonically increasing counter that starts atzero at the start of each descriptor. And finally, there is a set offlags that indicate the first and/or last packet of a descriptor.

Back on the target side, as the data packets arrive, they are checkedfor the first packet flag, a Pull Sequence Number that matches the oneexpected, and for a Data Sequence Number of zero. If a packet does notmatch these conditions, then the packet is discarded. Once a packet isreceived for this channel that meets these conditions, the DescriptorSequence Number of that packet is saved and the data transfer is assumedto have begun. Each subsequent packet received is checked for PullSequence Number, descriptor sequence matching expected (the expectedvalue is incremented when a “last” flag is seen), data sequence matchingexpected (the expected value is incremented for each packet, but iszeroed when the “last” flag is set), and the flags are checked as perabove. The transfer completes when the target receives the amount ofdata that is expected.

Service Processor

In various aspects of the description above reference is made to theservice processor. The service processor is a processor that providesvarious hardware functions to one or more other processors. The serviceprocessor runs commands from its own memory and provides services to aset of other processors (nodes). These services typically includemanufacturer specific items such as power-on, boot up services, andhardware initialization services such as insuring that certain registersand latches are set to zero or to other desired values during node startup. As it pertains to the present invention the service processor is theinterface for handling specified error conditions, typically of thehardware variety. The service processor is connected to the adapter viathe ACC port in the SCOM ring 230 as shown in FIG. 49. In FIG. 49, theterm GX refers to the processor bus. See also FIG. 38.

Throughout this specification, various parameters have been indicatedrepresenting currently preferred embodiments of the present invention.These indications should not in any way be construed as limitations orrestrictions with respect to the claims herein. They are simply thecurrently best perceived mode of practicing the claimed invention. It isalso noted that the present specification provides a detaileddescription of the present invention and also includes descriptions ofrelated inventions with which the claimed invention are designed towork. These other inventions should also not be construed as limitationson the claimed invention, particularly in terms of the environment inwhich the invention operates.

While the invention has been described in detail herein in accordancewith certain preferred embodiments thereof, many modifications andchanges therein may be effected by those skilled in the art.Accordingly, it is intended by the appended claims to cover all suchmodifications and changes as fall within the true spirit and scope ofthe invention.

1. A method for providing reliability in a message passing dataprocessing system employing communications adapters, said methodcomprising the steps of: designating a first communications adapterconnected to a data processing node as a master adapter; designating atleast one other communications adapter connected to said data processingnode as a slave adapter; and upon detection of failure within saidmaster adapter, assigning its operations to said slave adapter.