* [pushed] wwwdocs: gcc-11: Update arm "Straight-line Speculation vulnerability" link
@ 2023-02-02 21:50 Gerald Pfeifer
0 siblings, 0 replies; only message in thread
From: Gerald Pfeifer @ 2023-02-02 21:50 UTC (permalink / raw)
To: gcc-patches
Pushed.
Gerald
---
htdocs/gcc-11/changes.html | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/htdocs/gcc-11/changes.html b/htdocs/gcc-11/changes.html
index 4787fc26..cc0fdc19 100644
--- a/htdocs/gcc-11/changes.html
+++ b/htdocs/gcc-11/changes.html
@@ -807,7 +807,7 @@ You may also want to check out our
<li>The AArch64 Armv8-R architecture is now supported through the
<code>-march=armv8-r</code> option.</li>
<li>Mitigation against the
- <a href="https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation">Straight-line Speculation vulnerability</a>
+ <a href="https://developer.arm.com/documentation/102587/0102/Straight-line-speculation-frequently-asked-questions">Straight-line Speculation vulnerability</a>
is supported with the <code>-mharden-sls=</code> option. Please refer to the
documentation for usage instructions.</li>
<li>The availability of Advanced SIMD intrinsics available through the
--
2.39.1
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2023-02-02 21:50 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-02-02 21:50 [pushed] wwwdocs: gcc-11: Update arm "Straight-line Speculation vulnerability" link Gerald Pfeifer
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).