-
公开(公告)号:US10599835B2
公开(公告)日:2020-03-24
申请号:US15960467
申请日:2018-04-23
Applicant: VMware, Inc.
Inventor: Nadav Amit , Dan Tsafrir , Michael Wei
Abstract: Embodiments are disclosed to mitigate the meltdown vulnerability by selectively using page table isolation. Page table isolation is enabled for 64-bit applications, so that unprivileged areas in the kernel address space cannot be accessed in user mode due to speculative execution by the processor. On the other hand, page table isolation is disabled for 32-bit applications thereby providing mapping into unprivileged areas in the kernel address space. However, speculative execution is limited to a 32-bit address space in a 32-bit application, and s access to unprivileged areas in the kernel address space can be inhibited.
-
公开(公告)号:US20190243990A1
公开(公告)日:2019-08-08
申请号:US16016254
申请日:2018-06-22
Applicant: VMware, Inc.
Inventor: Michael Wei , Dan Tsafrir , Nadav Amit
Abstract: The present disclosure addresses the meltdown vulnerability resulting from speculative execution in a multi-core processing system. The operating system (OS) can be loaded for execution on one of several processing cores (OS core), while an application can be loaded for execution on another of the processing cores (application core). The OS core uses process page tables that map the entire kernel address space to physical memory. Conversely, the application core uses pages tables that map only a portion of the kernel address space to physical memory.
-
公开(公告)号:US20190243965A1
公开(公告)日:2019-08-08
申请号:US16004180
申请日:2018-06-08
Applicant: VMware, Inc.
Inventor: Michael Wei , Dan Tsafrir , Nadav Amit
IPC: G06F21/54 , G06F12/1009
CPC classification number: G06F12/1009 , G06F12/1441 , G06F21/52 , G06F21/54 , G06F21/577 , G06F21/74 , G06F2212/1044 , G06F2212/1052 , G06F2212/657 , G06F2221/034
Abstract: In accordance with embodiments of the present disclosure, a compiler can compile source code to produce binary code that includes address shifting code inserted with memory operations. The address shifting code can shift addresses of memory operations that access locations in the kernel address space into address locations in the user space, thus avoiding speculative access into the kernel address space.
-
-