Data access control method and node controller
A data access control and node controller technology, applied in the computer field, can solve problems affecting CPU access efficiency and low processing efficiency, and achieve the effect of saving processing and improving access efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0057] The embodiment of the present invention proposes a data access control method, figure 1 A flowchart showing a data access control method provided by an embodiment of the present invention, see figure 1 , the method includes the following steps:
[0058] Step 101: When receiving an access request for accessing certain data sent by the first node, the first node controller obtains the data attribute of the data to be accessed according to the access request.
[0059] In this step, the data attributes include shared data and private data. Wherein, the shared data means that besides the node where the data is located, there are other nodes that can read and / or update the data. Private data means that only the node where the data resides can read and / or update the data.
[0060] Step 102: The first node controller determines the processing mode of the access request according to the data attribute of the data to be accessed.
[0061] In this step, according to the data a...
Embodiment 2
[0068] In the embodiment of the present invention, a specific implementation manner of obtaining the data attribute of the data to be accessed in the above step 101 is given.
[0069] In this embodiment, the above step A1, obtaining the data attributes of the data to be accessed according to the access request includes:
[0070] According to the virtual address of the data to be accessed carried in the access request, the first node controller obtains the data attribute corresponding to the data to be accessed from the preset memory page table; wherein, the preset memory page table pre-stores There is a one-to-one correspondence between virtual addresses and data attributes; the access request carries the virtual address of the data to be accessed.
[0071] Among them, modern processors generally support memory protection mode, that is, each load and store instruction will be translated by the memory page table TLB (Translation Lookaside Buffer), which is responsible for conve...
Embodiment 3
[0074] In the embodiment of the present invention, a specific implementation process of the above step A1 is given.
[0075] In this embodiment, the above step A1: when the data attribute of the data to be accessed is private data, the first node controller sends an access request to the processor storage controller where the first node is located to request storage The controller assists in the access process of this data, including:
[0076] a11: When the data attribute of the data to be accessed is private data, if the first node controller determines that the access type of the first node to the data to be accessed is a read operation, and the data to be accessed does not exist in the cache of the first node , then send an access request for reading the data to be accessed to the storage controller of the processor where the first node is located; and receive the access data sent by the storage controller, the access data is the storage controller according to the access ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


