aboutsummaryrefslogtreecommitdiff
path: root/src/extensions.tex
diff options
context:
space:
mode:
authorKrste Asanovic <krste@eecs.berkeley.edu>2018-08-26 06:04:51 -0700
committerKrste Asanovic <krste@eecs.berkeley.edu>2018-08-26 06:04:51 -0700
commit9cf5c8e3eff9973bb97869419c4375fabd6e64b8 (patch)
tree4db0da7d535af7ee8d2414014e545e7030085784 /src/extensions.tex
parent48df4e3688823c01dbca5e61b2f2e8cfb6ebd6d9 (diff)
downloadriscv-isa-manual-9cf5c8e3eff9973bb97869419c4375fabd6e64b8.zip
riscv-isa-manual-9cf5c8e3eff9973bb97869419c4375fabd6e64b8.tar.gz
riscv-isa-manual-9cf5c8e3eff9973bb97869419c4375fabd6e64b8.tar.bz2
Updated several "user" references to "unprivileged".
Diffstat (limited to 'src/extensions.tex')
-rw-r--r--src/extensions.tex2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/extensions.tex b/src/extensions.tex
index 4346422..2517165 100644
--- a/src/extensions.tex
+++ b/src/extensions.tex
@@ -15,7 +15,7 @@ instruction-set extensions.
This chapter describes various ways in which the base RISC-V ISA can
be extended, together with the scheme for managing instruction-set
extensions developed by independent groups. This volume only deals
-with the user-level ISA, although the same approach and terminology is
+with the unprivileged ISA, although the same approach and terminology is
used for supervisor-level extensions described in the second volume.
\section{Extension Terminology}