aboutsummaryrefslogtreecommitdiff
path: root/src/smepmp.adoc
diff options
context:
space:
mode:
authorwmat <wmat@riscv.org>2024-04-10 09:33:32 -0400
committerwmat <wmat@riscv.org>2024-04-10 09:33:32 -0400
commit83fc7c1e9eca8a3abb77266c97acbf07275d2ce0 (patch)
tree524da26ea813753f7ee0a2cf1fff44171f4a8758 /src/smepmp.adoc
parenteb5af4af02e85ff033a9dfa90cb5db17bdce893e (diff)
downloadriscv-isa-manual-83fc7c1e9eca8a3abb77266c97acbf07275d2ce0.zip
riscv-isa-manual-83fc7c1e9eca8a3abb77266c97acbf07275d2ce0.tar.gz
riscv-isa-manual-83fc7c1e9eca8a3abb77266c97acbf07275d2ce0.tar.bz2
Fix PMP chapter title.
Updated chapter title to "Smepmp" Extension for PMP Enhancements for memory access and execution prevention in Machine mode, Version 1.0.0
Diffstat (limited to 'src/smepmp.adoc')
-rw-r--r--src/smepmp.adoc2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/smepmp.adoc b/src/smepmp.adoc
index aa5c58c..8ec0c70 100644
--- a/src/smepmp.adoc
+++ b/src/smepmp.adoc
@@ -1,5 +1,5 @@
[[smepmp]]
-== "Smepmp" Enhancements for memory access and execution prevention on Machine mode, Version 1.0.0
+== "Smepmp" Extension for PMP Enhancements for memory access and execution prevention in Machine mode, Version 1.0.0
=== Introduction
Being able to access the memory of a process running at a high privileged execution mode, such as the Supervisor or Machine mode, from a lower privileged mode such as the User mode, introduces an obvious attack vector since it allows for an attacker to perform privilege escalation, and tamper with the code and/or data of that process. A less obvious attack vector exists when the reverse happens, in which case an attacker instead of tampering with code and/or data that belong to a high-privileged process, can tamper with the memory of an unprivileged / less-privileged process and trick the high-privileged process to use or execute it.