Skip to content

Commit b96194e

Browse files
committed
Converted summary to American English spellings while reading through
1 parent 01df1dc commit b96194e

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

src/summary.adoc

+5-5
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
== Quick Start
22

33
This document describes the RISC-V extensions for supporting CHERI capabilities in hardware.
4-
Capabilities can be used to provide memory safety, mitigating up to 70% of memory safety issues cite:[msrc-cheri-eval], as well as to provide efficient compartmentalisation.
4+
Capabilities can be used to provide memory safety, mitigating up to 70% of memory safety issues cite:[msrc-cheri-eval], as well as to provide efficient compartmentalization.
55
The extensions are split into the core features required for a working capability system ({cheri_base_ext_name}), and features required to support a mix-and-match of binaries compiled for CHERI and unchanged binaries ({cheri_default_ext_name}).
66
Some other smaller extensions are described that provide additional functionality relevant to CHERI.
77

88
=== Capability Properties
99

10-
Capabilities are 2*XLEN (which we call CLEN) bit structures, containing all the information required to identify and authorise access to a region of memory.
10+
Capabilities are 2*XLEN (which we call CLEN) bit structures, containing all the information required to identify and authorize access to a region of memory.
1111
This includes:
1212

1313
* An XLEN bit address, describing where the capability currently points.
@@ -46,12 +46,12 @@ This means the following state is added:
4646

4747
=== Checking Memory
4848

49-
Every memory access performed by a CHERI core must be authorised by a capability.
49+
Every memory access performed by a CHERI core must be authorized by a capability.
5050
It is explicitly defined for every instruction where to find the capability to check against.
5151
In _purecap_ code, where all pointers are individual capabilities, the capability and address are used together, so e.g. `lw t0, 16(csp)` loads a word from memory, getting the address and bounds from the `csp` register.
52-
For code that has not yet been fully adapted to CHERI (_hybrid_ code), the processor can run in a pointer mode (not to be confused with a privilege mode) where the authorising capability is instead taken from a special CSR: the default data capability (<<ddc>>).
52+
For code that has not yet been fully adapted to CHERI (_hybrid_ code), the processor can run in a pointer mode (not to be confused with a privilege mode) where the authorizing capability is instead taken from a special CSR: the default data capability (<<ddc>>).
5353

54-
Instruction fetch is also authorised by a capability: the program counter capability (<<pcc>>) which extends PC.
54+
Instruction fetch is also authorized by a capability: the program counter capability (<<pcc>>) which extends PC.
5555
This allows code fetch to be bounded, preventing a wide range of attacks that subvert control flow with integer data.
5656
Where {cheri_default_ext_name} is supported, the <<pcc>> also contains the <<m_bit,mode bit>> indicating whether the processor is running in integer or capability pointer mode.
5757
Changing the bounds used for instruction fetch or the pointer mode can be as easy as performing a capability-based jump (<<JALR>> in capability pointer mode).

0 commit comments

Comments
 (0)