diff options
author | wmat <wmat@riscv.org> | 2024-04-10 09:33:32 -0400 |
---|---|---|
committer | wmat <wmat@riscv.org> | 2024-04-10 09:33:32 -0400 |
commit | 83fc7c1e9eca8a3abb77266c97acbf07275d2ce0 (patch) | |
tree | 524da26ea813753f7ee0a2cf1fff44171f4a8758 /src/smepmp.adoc | |
parent | eb5af4af02e85ff033a9dfa90cb5db17bdce893e (diff) | |
download | riscv-isa-manual-83fc7c1e9eca8a3abb77266c97acbf07275d2ce0.zip riscv-isa-manual-83fc7c1e9eca8a3abb77266c97acbf07275d2ce0.tar.gz riscv-isa-manual-83fc7c1e9eca8a3abb77266c97acbf07275d2ce0.tar.bz2 |
Fix PMP chapter title.
Updated chapter title to "Smepmp" Extension for PMP Enhancements for memory access and execution prevention in Machine mode, Version 1.0.0
Diffstat (limited to 'src/smepmp.adoc')
-rw-r--r-- | src/smepmp.adoc | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/smepmp.adoc b/src/smepmp.adoc index aa5c58c..8ec0c70 100644 --- a/src/smepmp.adoc +++ b/src/smepmp.adoc @@ -1,5 +1,5 @@ [[smepmp]] -== "Smepmp" Enhancements for memory access and execution prevention on Machine mode, Version 1.0.0 +== "Smepmp" Extension for PMP Enhancements for memory access and execution prevention in Machine mode, Version 1.0.0 === Introduction Being able to access the memory of a process running at a high privileged execution mode, such as the Supervisor or Machine mode, from a lower privileged mode such as the User mode, introduces an obvious attack vector since it allows for an attacker to perform privilege escalation, and tamper with the code and/or data of that process. A less obvious attack vector exists when the reverse happens, in which case an attacker instead of tampering with code and/or data that belong to a high-privileged process, can tamper with the memory of an unprivileged / less-privileged process and trick the high-privileged process to use or execute it. |