abstract |
Techniques for metadata handling that can be used to encode any number of security policies for code running on a processor are described. Metadata can be added to every word in the system and metadata processing units can be used that work in parallel with the data flow to enforce an arbitrary set of policies. In one aspect, metadata can be characterized as unlimited and software programmable to be applicable to various metadata processing strategies. Techniques and policies have various purposes including, for example, safety, security, and synchronization. Additionally, aspects and techniques are described with respect to metadata processing in RISC-V architecture-based embodiments. |