Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp576005pxp; Wed, 9 Mar 2022 08:27:00 -0800 (PST) X-Google-Smtp-Source: ABdhPJyLiqJYb6t53y4xH33qcV/HWH9szQPHgDThS0AWagwLad9rKOUkimyIYO6GJED8TAbRkIX1 X-Received: by 2002:a17:902:9007:b0:14f:3680:66d1 with SMTP id a7-20020a170902900700b0014f368066d1mr430385plp.91.1646843220534; Wed, 09 Mar 2022 08:27:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1646843220; cv=none; d=google.com; s=arc-20160816; b=nLuLd+1YWhkQnolNMnrrqRVuuSlD3uEMWNAf1RwablwEh7d58OVzEBobaQtdXrHjnf onLhHgWWr2Roc42ddRnyucqlAXibxp6hu116YUp0hJvS0uzqwtH13r2nV1Yv0Xv/s4+2 F36WV2HDBplj7WtnsrCGS9xvfRwQKQ/BGOkem8vkLN8s+SU7aWZrt2lfzhPyMiuQBXJ3 Zxpb66zYuKNDIJAGZYVs+6G/dbyisePeaiATmAYanA/ujLqeIpBtmwCDLli/fPMsXt10 YrR4YxQRXKI3la1qG9oZEv4aLXBwudMNTLhE7Nm5RVXjsmLV++2SqKIRBF7Ou5UUjV6e nIFg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=n64A/ByJebULCs5ckoi9JGTGQCvdZpzKaF8tLNwb6m8=; b=w6Y0mLHObiM75UtQMxFlXqZcAxdnsTkMZU1hZUu4YTcH25YAjWyzg/2ZSuxKsc9gOy 4P0qz4IL7f6sf2FimFyg7cbQRkqodJs6WcMtW+PkqsursmRbaDSKxe5NaUvA84jkQOp7 j2kgi1G30RsSxFMlpsCjczZC6ma24MmASSM6nnEoMB/PqIBkXZF01+YPiy6KvyyFjQ9X PQlT1fw4SVxLy4dFBZigNToDBYCTZ1uILySkzDFmYFy1tYHigJuJGYCH3sADS5CEn8FZ FlG4/ZWFDfpdkL6OrFCQvJti9eMDjdkRypK0Z0VH2yXWmLZMsN2eqxK4N9uhsSygeixI bk5Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=1IQZY7Qg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id z5-20020a170903018500b00151cd6ee067si2331464plg.564.2022.03.09.08.26.41; Wed, 09 Mar 2022 08:27:00 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=1IQZY7Qg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234298AbiCIQDm (ORCPT + 99 others); Wed, 9 Mar 2022 11:03:42 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40414 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234175AbiCIQCn (ORCPT ); Wed, 9 Mar 2022 11:02:43 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3C72217AEF0; Wed, 9 Mar 2022 08:01:43 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id AB0E7B82229; Wed, 9 Mar 2022 16:01:41 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 16906C340EF; Wed, 9 Mar 2022 16:01:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1646841700; bh=iYMuhddysstvIfw0kTZMQ+L1I5XrW+hAdLtOqnTgSXE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=1IQZY7QgDVnpeZcs5eFKWvajd6tCa5oNAZktYGUbfZnfDWnJ0exNqvIlWGVDLvAmM Dwtkiau2y38Mbz6RFwuwUY5f7GdDEp8HS4m91nNxmMgOuJQ6fK4kz7a0C1uTptDFDH 4AkEnuJ5kMXuop54lzIKWyJOdN+Sp9Uurs2JoQFE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Kim Phillips , Borislav Petkov , Ben Hutchings Subject: [PATCH 4.9 14/24] x86/speculation: Update link to AMD speculation whitepaper Date: Wed, 9 Mar 2022 16:59:27 +0100 Message-Id: <20220309155856.719138797@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220309155856.295480966@linuxfoundation.org> References: <20220309155856.295480966@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Kim Phillips commit e9b6013a7ce31535b04b02ba99babefe8a8599fa upstream. Update the link to the "Software Techniques for Managing Speculation on AMD Processors" whitepaper. Signed-off-by: Kim Phillips Signed-off-by: Borislav Petkov [bwh: Backported to 4.9: adjust filename] Signed-off-by: Ben Hutchings Signed-off-by: Greg Kroah-Hartman --- Documentation/hw-vuln/spectre.rst | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) --- a/Documentation/hw-vuln/spectre.rst +++ b/Documentation/hw-vuln/spectre.rst @@ -60,8 +60,8 @@ privileged data touched during the specu Spectre variant 1 attacks take advantage of speculative execution of conditional branches, while Spectre variant 2 attacks use speculative execution of indirect branches to leak privileged memory. -See :ref:`[1] ` :ref:`[5] ` :ref:`[7] ` -:ref:`[10] ` :ref:`[11] `. +See :ref:`[1] ` :ref:`[5] ` :ref:`[6] ` +:ref:`[7] ` :ref:`[10] ` :ref:`[11] `. Spectre variant 1 (Bounds Check Bypass) --------------------------------------- @@ -746,7 +746,7 @@ AMD white papers: .. _spec_ref6: -[6] `Software techniques for managing speculation on AMD processors `_. +[6] `Software techniques for managing speculation on AMD processors `_. ARM white papers: