diff options
author | 2023-06-12 17:10:49 -0700 | |
---|---|---|
committer | 2023-08-02 15:01:50 -0700 | |
commit | 1eb2b7841c37c6aed20b50551902330c28618415 (patch) | |
tree | f640575e292074518ee71161e029e70d345d301e /scripts/generate_rust_analyzer.py | |
parent | mm: Don't allow write GUPs to shadow stack memory (diff) | |
download | linux-rng-1eb2b7841c37c6aed20b50551902330c28618415.tar.xz linux-rng-1eb2b7841c37c6aed20b50551902330c28618415.zip |
Documentation/x86: Add CET shadow stack description
Introduce a new document on Control-flow Enforcement Technology (CET).
Co-developed-by: Yu-cheng Yu <yu-cheng.yu@intel.com>
Signed-off-by: Yu-cheng Yu <yu-cheng.yu@intel.com>
Signed-off-by: Rick Edgecombe <rick.p.edgecombe@intel.com>
Signed-off-by: Dave Hansen <dave.hansen@linux.intel.com>
Reviewed-by: Borislav Petkov (AMD) <bp@alien8.de>
Reviewed-by: Kees Cook <keescook@chromium.org>
Acked-by: Mike Rapoport (IBM) <rppt@kernel.org>
Tested-by: Pengfei Xu <pengfei.xu@intel.com>
Tested-by: John Allen <john.allen@amd.com>
Tested-by: Kees Cook <keescook@chromium.org>
Link: https://lore.kernel.org/all/20230613001108.3040476-24-rick.p.edgecombe%40intel.com
Diffstat (limited to 'scripts/generate_rust_analyzer.py')
0 files changed, 0 insertions, 0 deletions