diff options
author | Krste Asanovic <krste@eecs.berkeley.edu> | 2018-08-26 06:04:51 -0700 |
---|---|---|
committer | Krste Asanovic <krste@eecs.berkeley.edu> | 2018-08-26 06:04:51 -0700 |
commit | 9cf5c8e3eff9973bb97869419c4375fabd6e64b8 (patch) | |
tree | 4db0da7d535af7ee8d2414014e545e7030085784 /src/extensions.tex | |
parent | 48df4e3688823c01dbca5e61b2f2e8cfb6ebd6d9 (diff) | |
download | riscv-isa-manual-9cf5c8e3eff9973bb97869419c4375fabd6e64b8.zip riscv-isa-manual-9cf5c8e3eff9973bb97869419c4375fabd6e64b8.tar.gz riscv-isa-manual-9cf5c8e3eff9973bb97869419c4375fabd6e64b8.tar.bz2 |
Updated several "user" references to "unprivileged".
Diffstat (limited to 'src/extensions.tex')
-rw-r--r-- | src/extensions.tex | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/extensions.tex b/src/extensions.tex index 4346422..2517165 100644 --- a/src/extensions.tex +++ b/src/extensions.tex @@ -15,7 +15,7 @@ instruction-set extensions. This chapter describes various ways in which the base RISC-V ISA can be extended, together with the scheme for managing instruction-set extensions developed by independent groups. This volume only deals -with the user-level ISA, although the same approach and terminology is +with the unprivileged ISA, although the same approach and terminology is used for supervisor-level extensions described in the second volume. \section{Extension Terminology} |