aboutsummaryrefslogtreecommitdiff
path: root/src/smepmp.adoc
diff options
context:
space:
mode:
authorwmat <wmat@riscv.org>2024-04-09 15:34:25 -0400
committerwmat <wmat@riscv.org>2024-04-09 15:34:25 -0400
commitd125ebd61769cefce9f4327aa839a65018a84975 (patch)
tree811b601a95a07578ca5791dd366b8a359be29ae4 /src/smepmp.adoc
parentc6cf0cb45b539fa27309ef1cfca19a568e98735d (diff)
downloadriscv-isa-manual-d125ebd61769cefce9f4327aa839a65018a84975.zip
riscv-isa-manual-d125ebd61769cefce9f4327aa839a65018a84975.tar.gz
riscv-isa-manual-d125ebd61769cefce9f4327aa839a65018a84975.tar.bz2
Updating chapter titles to make them consisten.
Removed extraneous use of the word Standard. Quoted extension names when applicable.
Diffstat (limited to 'src/smepmp.adoc')
-rw-r--r--src/smepmp.adoc2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/smepmp.adoc b/src/smepmp.adoc
index 547f723..44142d4 100644
--- a/src/smepmp.adoc
+++ b/src/smepmp.adoc
@@ -1,5 +1,5 @@
[[smepmp]]
-== PMP Enhancements for memory access and execution prevention on Machine mode (Smepmp)
+== "Smepmp" Enhancements for memory access and execution prevention on Machine mode
=== Introduction
Being able to access the memory of a process running at a high privileged execution mode, such as the Supervisor or Machine mode, from a lower privileged mode such as the User mode, introduces an obvious attack vector since it allows for an attacker to perform privilege escalation, and tamper with the code and/or data of that process. A less obvious attack vector exists when the reverse happens, in which case an attacker instead of tampering with code and/or data that belong to a high-privileged process, can tamper with the memory of an unprivileged / less-privileged process and trick the high-privileged process to use or execute it.