Since gitbook.io is no longer used, update the remaining links to point to the documents on tianocore-docs.github.io instead.
Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Rebecca Cran <rebe...@bsdio.com> --- CET-in-SMM.md | 2 +- EDK-II-Code-Formatting.md | 2 +- EDK-II-Security-White-Papers.md | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/CET-in-SMM.md b/CET-in-SMM.md index ade87f1d1737..5f94d81c258d 100644 --- a/CET-in-SMM.md +++ b/CET-in-SMM.md @@ -13,7 +13,7 @@ For detail of CET, please refer to Control-flow Enforcement Technology whitepape # Introduction -EDKII has enabled different technology for security, such as memory level protection [A Tour Beyound BIOS - Memory Protection in UEFI BIOS](https://edk2-docs.gitbook.io/a-tour-beyond-bios-memory-protection-in-uefi-bios/), or buffer overflow mitigation [A Tour Beyound BIOS - Mitigate Buffer Overflow in UEFI](https://tianocore-docs.github.io/ATBB-Mitigate_Buffer_Overflow_in_UEFI/draft/). +EDKII has enabled different technology for security, such as memory level protection [A Tour Beyound BIOS - Memory Protection in UEFI BIOS](https://tianocore-docs.github.io/ATBB-Memory_Protection_in_UEFI_BIOS/draft/), or buffer overflow mitigation [A Tour Beyound BIOS - Mitigate Buffer Overflow in UEFI](https://tianocore-docs.github.io/ATBB-Mitigate_Buffer_Overflow_in_UEFI/draft/). Now EDKII can use CET to enforce the control-flow as well. The current status is that EDKII enabled ShadowStatck in SMM. diff --git a/EDK-II-Code-Formatting.md b/EDK-II-Code-Formatting.md index 0dba6850230d..bc59ec8e5001 100644 --- a/EDK-II-Code-Formatting.md +++ b/EDK-II-Code-Formatting.md @@ -1,6 +1,6 @@ # EDK II Code Formatting -To better realize the goals of the [EDK II C Coding Standards Specification](https://edk2-docs.gitbook.io/edk-ii-c-coding-standards-specification/), +To better realize the goals of the [EDK II C Coding Standards Specification](https://tianocore-docs.github.io/edk2-CCodingStandardsSpecification/draft/), EDK II code formatting is automated using a source code beautifier called Uncrustify. Uncrustify is compatible with C/C++ in addition to other languages. In EDK II, it is used to format C language source code. diff --git a/EDK-II-Security-White-Papers.md b/EDK-II-Security-White-Papers.md index c562b10c12d3..eff20f195de0 100644 --- a/EDK-II-Security-White-Papers.md +++ b/EDK-II-Security-White-Papers.md @@ -22,7 +22,7 @@ A list of White Papers and information for EDK II Security from multiple sources * [Universal Scalable Firmware - Security](https://universalscalablefirmware.github.io/documentation/5_security.html) (October 2021) **Memory Protection:** -* [A Tour Beyond BIOS – Memory Protection in UEFI BIOS - gitbook](https://edk2-docs.gitbook.io/a-tour-beyond-bios-memory-protection-in-uefi-bios) (March 2017) +* [A Tour Beyond BIOS – Memory Protection in UEFI BIOS - gitbook](https://tianocore-docs.github.io/ATBB-Memory_Protection_in_UEFI_BIOS/draft/) (March 2017) * [A Tour Beyond BIOS - Mitigate Buffer Overflow in UEFI](https://tianocore-docs.github.io/ATBB-Mitigate_Buffer_Overflow_in_UEFI/draft/) (April 2018) **SMM Protection:** -- 2.39.2 -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#103433): https://edk2.groups.io/g/devel/message/103433 Mute This Topic: https://groups.io/mt/98420239/21656 Group Owner: devel+ow...@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-