32-BIT ADDRESS SPACE CONTAINMENT TO SECURE PROCESSES FROM SPECULATIVE ROGUE CACHE LOADS
Embodiments are disclosed to mitigate the meltdown vulnerability by selectively using page table isolation. Page table isolation is enabled for 64-bit applications, so that unprivileged areas in the kernel address space cannot be accessed in user mode due to speculative execution by the processor. O...
Saved in:
Main Authors | , , |
---|---|
Format | Patent |
Language | English |
Published |
08.08.2019
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Embodiments are disclosed to mitigate the meltdown vulnerability by selectively using page table isolation. Page table isolation is enabled for 64-bit applications, so that unprivileged areas in the kernel address space cannot be accessed in user mode due to speculative execution by the processor. On the other hand, page table isolation is disabled for 32-bit applications thereby providing mapping into unprivileged areas in the kernel address space. However, speculative execution is limited to a 32-bit address space in a 32-bit application, and s access to unprivileged areas in the kernel address space can be inhibited. |
---|---|
Bibliography: | Application Number: US201815960467 |