This repository contains the CHERI extension specification, adding hardware capabilities to RISC-V ISA to enable fine-grained memory protection and scalable compartmentalization.
The name is our fault, but it's not the best, as accesses before the base also fault, not just ones beyond base + length. Bounds violation makes it clear that it's for anything outside the bounds, and is the term we actually use in practice.
The name is our fault, but it's not the best, as accesses before the base also fault, not just ones beyond base + length. Bounds violation makes it clear that it's for anything outside the bounds, and is the term we actually use in practice.