Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp150965pxp; Fri, 11 Mar 2022 01:10:58 -0800 (PST) X-Google-Smtp-Source: ABdhPJyuLPduWFziS9NQ7hjmFiuteHnCuL3NknI6kJWJTfFuY3jnC1F01HzTA4lqQjgRW5n9CuxG X-Received: by 2002:a17:90a:73ce:b0:1bf:702c:f384 with SMTP id n14-20020a17090a73ce00b001bf702cf384mr21165384pjk.177.1646989858612; Fri, 11 Mar 2022 01:10:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1646989858; cv=none; d=google.com; s=arc-20160816; b=Y81quxdC6FUQCbmGtHDNlouRo1NDK+400gm2Vsmj5W14sZnPFBoYsD4ld7QllY7IZK Nyp/TzVqYmYVUUqivEMDO9s751JiUekAD7S6GkyWo/hspUffoolnv7agWSa9POt//oXi 9odE+ksGLX6WZigK6Uc+HzmKtMRZ4CXZ8avTUSbaBroXAZMmaHC5wPzMeTETxsEIFZv+ 4TfXuNyO32Rw0TryY7RCNgLvLr8C0KsXaH+oFrcaBfK3alHEHE0NG9vJi5FAj0HJPX99 WJg81T1hxYYhmWCb5TxMZn/Oci+6rI8uaFT13depsjeMimsC9U4CjrSOFW/c+Ypu7Lm/ MC1g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Lbex/Tm4DF5hQD2VNEG2fgOYc0tolm9U5cq1vaO7X0s=; b=fQyLoOUMpq501O36t5hpS0HnvuzrTm6RjTh4MPCndKA6+T7IFLFCXBTsnLePgz/zDL VrMn2NbJlkWbAl+zL/eaIxwAKvF3ET7I3FBTkMQMzeINhNO66M144CSc0BPRFU11Rwqf C1HmmTm8HgJHksoqUQ7E9q/5TiiXOsKZx65kRUOWDtEueYGwXXzOGh4Z6TfHOXPxP5ph 5Y3bB7EuqP/EdD0iCZSyOMXgJJUSZuzIloER6bNWBHaVWQN/aWXuso3qkPj6XTPCwI4u xWVTxdOkLQiTqrIxC0b7zy7Ex5CL6YbMnkhEYURwFudygMCkC/ClAKsMPcU7Lsy4Wq8B 87eQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="mwJ9EHQ/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q10-20020a656a8a000000b00373bbb1e408si8234677pgu.412.2022.03.11.01.10.44; Fri, 11 Mar 2022 01:10:58 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="mwJ9EHQ/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240748AbiCJOL7 (ORCPT + 99 others); Thu, 10 Mar 2022 09:11:59 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51164 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242767AbiCJOL3 (ORCPT ); Thu, 10 Mar 2022 09:11:29 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A59A014A071; Thu, 10 Mar 2022 06:10:26 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 5B1F6B82670; Thu, 10 Mar 2022 14:10:25 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id B844EC340E8; Thu, 10 Mar 2022 14:10:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1646921424; bh=PGRE0saXYgT+u/n78gzLARVUPRogumyF8xx5U1oiHyc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=mwJ9EHQ/Tn6YPPsNZd5jNxXfbayf3qjtUPsRM7E4VUX9SPOj1dMD8BOYWg+ULNgWx tAgZsXcrU0HO7vUhWY579JSY232JC1HGMucfqUySEuCN1IAOuZ76RQelJOFvu0feTZ 9dnWMgYCfrjGSl0jv6Y2fBgJTm7F68Te0o/NiKFA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Kim Phillips , Borislav Petkov Subject: [PATCH 5.16 06/53] x86/speculation: Update link to AMD speculation whitepaper Date: Thu, 10 Mar 2022 15:09:11 +0100 Message-Id: <20220310140812.018440868@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220310140811.832630727@linuxfoundation.org> References: <20220310140811.832630727@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Kim Phillips commit e9b6013a7ce31535b04b02ba99babefe8a8599fa upstream. Update the link to the "Software Techniques for Managing Speculation on AMD Processors" whitepaper. Signed-off-by: Kim Phillips Signed-off-by: Borislav Petkov Signed-off-by: Greg Kroah-Hartman --- Documentation/admin-guide/hw-vuln/spectre.rst | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) --- a/Documentation/admin-guide/hw-vuln/spectre.rst +++ b/Documentation/admin-guide/hw-vuln/spectre.rst @@ -60,8 +60,8 @@ privileged data touched during the specu Spectre variant 1 attacks take advantage of speculative execution of conditional branches, while Spectre variant 2 attacks use speculative execution of indirect branches to leak privileged memory. -See :ref:`[1] ` :ref:`[5] ` :ref:`[7] ` -:ref:`[10] ` :ref:`[11] `. +See :ref:`[1] ` :ref:`[5] ` :ref:`[6] ` +:ref:`[7] ` :ref:`[10] ` :ref:`[11] `. Spectre variant 1 (Bounds Check Bypass) --------------------------------------- @@ -697,7 +697,7 @@ AMD white papers: .. _spec_ref6: -[6] `Software techniques for managing speculation on AMD processors `_. +[6] `Software techniques for managing speculation on AMD processors `_. ARM white papers: