Skip to content

Commit e9b6013

Browse files
kimphillamdsuryasaimadhu
authored andcommitted
x86/speculation: Update link to AMD speculation whitepaper
Update the link to the "Software Techniques for Managing Speculation on AMD Processors" whitepaper. Signed-off-by: Kim Phillips <[email protected]> Signed-off-by: Borislav Petkov <[email protected]>
1 parent 244d00b commit e9b6013

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

Documentation/admin-guide/hw-vuln/spectre.rst

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -60,8 +60,8 @@ privileged data touched during the speculative execution.
6060
Spectre variant 1 attacks take advantage of speculative execution of
6161
conditional branches, while Spectre variant 2 attacks use speculative
6262
execution of indirect branches to leak privileged memory.
63-
See :ref:`[1] <spec_ref1>` :ref:`[5] <spec_ref5>` :ref:`[7] <spec_ref7>`
64-
:ref:`[10] <spec_ref10>` :ref:`[11] <spec_ref11>`.
63+
See :ref:`[1] <spec_ref1>` :ref:`[5] <spec_ref5>` :ref:`[6] <spec_ref6>`
64+
:ref:`[7] <spec_ref7>` :ref:`[10] <spec_ref10>` :ref:`[11] <spec_ref11>`.
6565

6666
Spectre variant 1 (Bounds Check Bypass)
6767
---------------------------------------
@@ -697,7 +697,7 @@ AMD white papers:
697697

698698
.. _spec_ref6:
699699

700-
[6] `Software techniques for managing speculation on AMD processors <https://developer.amd.com/wp-content/resources/90343-B_SoftwareTechniquesforManagingSpeculation_WP_7-18Update_FNL.pdf>`_.
700+
[6] `Software techniques for managing speculation on AMD processors <https://developer.amd.com/wp-content/resources/Managing-Speculation-on-AMD-Processors.pdf>`_.
701701

702702
ARM white papers:
703703

0 commit comments

Comments
 (0)