From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from hamza.pair.com (hamza.pair.com [209.68.5.143]) by sourceware.org (Postfix) with ESMTPS id 243AF3858C52 for ; Thu, 2 Feb 2023 21:50:20 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 243AF3858C52 Authentication-Results: sourceware.org; dmarc=none (p=none dis=none) header.from=pfeifer.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=pfeifer.com Received: from hamza.pair.com (localhost [127.0.0.1]) by hamza.pair.com (Postfix) with ESMTP id 0691B33E77 for ; Thu, 2 Feb 2023 16:50:18 -0500 (EST) Received: from naga.localdomain (188-23-1-149.adsl.highway.telekom.at [188.23.1.149]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by hamza.pair.com (Postfix) with ESMTPSA id 9682C33E80 for ; Thu, 2 Feb 2023 16:50:17 -0500 (EST) Date: Thu, 2 Feb 2023 22:50:16 +0100 (CET) From: Gerald Pfeifer To: gcc-patches@gcc.gnu.org Subject: [pushed] wwwdocs: gcc-11: Update arm "Straight-line Speculation vulnerability" link MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII X-Scanned-By: mailmunge 3.10 on 209.68.5.143 Message-Id: <20230202215018.0691B33E77@hamza.pair.com> X-Spam-Status: No, score=-9.3 required=5.0 tests=BAYES_00,GIT_PATCH_0,KAM_DMARC_STATUS,RCVD_IN_BARRACUDACENTRAL,SPF_HELO_NONE,SPF_PASS,TXREP autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org List-Id: Pushed. Gerald --- htdocs/gcc-11/changes.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/htdocs/gcc-11/changes.html b/htdocs/gcc-11/changes.html index 4787fc26..cc0fdc19 100644 --- a/htdocs/gcc-11/changes.html +++ b/htdocs/gcc-11/changes.html @@ -807,7 +807,7 @@ You may also want to check out our
  • The AArch64 Armv8-R architecture is now supported through the -march=armv8-r option.
  • Mitigation against the - Straight-line Speculation vulnerability + Straight-line Speculation vulnerability is supported with the -mharden-sls= option. Please refer to the documentation for usage instructions.
  • The availability of Advanced SIMD intrinsics available through the -- 2.39.1