US 12,086,072 B1
Memory vulnerability mitigation
Daniel John Farrell, Seattle, WA (US)
Assigned to Amazon Technologies, Inc., Reno, NV (US)
Filed by Amazon Technologies, Inc., Reno, NV (US)
Filed on Mar. 11, 2020, as Appl. No. 16/816,044.
Int. Cl. G06F 12/00 (2006.01); G06F 11/10 (2006.01); G06F 12/02 (2006.01); G06F 12/1009 (2016.01)
CPC G06F 12/1009 (2013.01) [G06F 11/1044 (2013.01); G06F 12/023 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method, comprising:
allocating a set of physical memory pages for use by an application;
mapping the set of physical memory pages to a set of virtual memory pages, wherein the application can request data operations to be performed in the set of physical memory pages using virtual addresses of the virtual memory pages;
responsive to detecting an anomalous bit flip in an identified memory page of the set of physical memory pages, copying data, including a corrected value for the bit corresponding to the bit flip, from the identified memory page to a physical guard page of a set of physical guard pages, wherein each storage cell adjacent to the physical guard page is not allocated by the application to store data;
updating a mapping of the virtual memory pages from the identified memory page to the physical guard page; and
enabling the application to request the data operations to be performed in the physical guard page using the virtual addresses of the virtual memory pages.