public inbox for gcc-patches@gcc.gnu.org
 help / color / mirror / Atom feed
* [pushed] wwwdocs: gcc-11: Update arm "Straight-line Speculation vulnerability" link
@ 2023-02-02 21:50 Gerald Pfeifer
  0 siblings, 0 replies; only message in thread
From: Gerald Pfeifer @ 2023-02-02 21:50 UTC (permalink / raw)
  To: gcc-patches

Pushed.

Gerald
---
 htdocs/gcc-11/changes.html | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/htdocs/gcc-11/changes.html b/htdocs/gcc-11/changes.html
index 4787fc26..cc0fdc19 100644
--- a/htdocs/gcc-11/changes.html
+++ b/htdocs/gcc-11/changes.html
@@ -807,7 +807,7 @@ You may also want to check out our
   <li>The AArch64 Armv8-R architecture is now supported through the
   <code>-march=armv8-r</code> option.</li>
   <li>Mitigation against the
-  <a href="https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation">Straight-line Speculation vulnerability</a>
+  <a href="https://developer.arm.com/documentation/102587/0102/Straight-line-speculation-frequently-asked-questions">Straight-line Speculation vulnerability</a>
   is supported with the <code>-mharden-sls=</code> option.  Please refer to the
   documentation for usage instructions.</li>
   <li>The availability of Advanced SIMD intrinsics available through the
-- 
2.39.1

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2023-02-02 21:50 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-02-02 21:50 [pushed] wwwdocs: gcc-11: Update arm "Straight-line Speculation vulnerability" link Gerald Pfeifer

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).