Documentation/admin-guide/hw-vuln/spectre.rst | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)
The papers are published by Intel, AMD and MIPS.
Signed-off-by: Nikola Z. Ivanov <zlatistiv@gmail.com>
---
The MIPS blog post is nowhere to be found on mips.com,
instead a link is placed to the last time the web archive
has crawled it.
Documentation/admin-guide/hw-vuln/spectre.rst | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/Documentation/admin-guide/hw-vuln/spectre.rst b/Documentation/admin-guide/hw-vuln/spectre.rst
index 132e0bc6007e..991f12adef8d 100644
--- a/Documentation/admin-guide/hw-vuln/spectre.rst
+++ b/Documentation/admin-guide/hw-vuln/spectre.rst
@@ -664,7 +664,7 @@ Intel white papers:
.. _spec_ref1:
-[1] `Intel analysis of speculative execution side channels <https://newsroom.intel.com/wp-content/uploads/sites/11/2018/01/Intel-Analysis-of-Speculative-Execution-Side-Channels.pdf>`_.
+[1] `Intel analysis of speculative execution side channels <https://www.intel.com/content/dam/www/public/us/en/documents/white-papers/analysis-of-speculative-execution-side-channels-white-paper.pdf>`_.
.. _spec_ref2:
@@ -682,7 +682,7 @@ AMD white papers:
.. _spec_ref5:
-[5] `AMD64 technology indirect branch control extension <https://developer.amd.com/wp-content/resources/Architecture_Guidelines_Update_Indirect_Branch_Control.pdf>`_.
+[5] `AMD64 technology indirect branch control extension <https://www.amd.com/content/dam/amd/en/documents/processor-tech-docs/white-papers/111006-architecture-guidelines-update-amd64-technology-indirect-branch-control-extension.pdf>`_.
.. _spec_ref6:
@@ -708,7 +708,7 @@ MIPS white paper:
.. _spec_ref10:
-[10] `MIPS: response on speculative execution and side channel vulnerabilities <https://www.mips.com/blog/mips-response-on-speculative-execution-and-side-channel-vulnerabilities/>`_.
+[10] `MIPS: response on speculative execution and side channel vulnerabilities <https://web.archive.org/web/20220512003005if_/https://www.mips.com/blog/mips-response-on-speculative-execution-and-side-channel-vulnerabilities/>`_.
Academic papers:
--
2.49.0
"Nikola Z. Ivanov" <zlatistiv@gmail.com> writes: > The papers are published by Intel, AMD and MIPS. > > Signed-off-by: Nikola Z. Ivanov <zlatistiv@gmail.com> > --- > The MIPS blog post is nowhere to be found on mips.com, > instead a link is placed to the last time the web archive > has crawled it. > > Documentation/admin-guide/hw-vuln/spectre.rst | 6 +++--- > 1 file changed, 3 insertions(+), 3 deletions(-) I sure wish I understood why companies feel such a need to break links so often ... I've applied this, thanks. jon
On Mon, Aug 18, 2025 at 10:05:25AM -0600, Jonathan Corbet wrote: > "Nikola Z. Ivanov" <zlatistiv@gmail.com> writes: > > > The papers are published by Intel, AMD and MIPS. > > > > Signed-off-by: Nikola Z. Ivanov <zlatistiv@gmail.com> > > --- > > The MIPS blog post is nowhere to be found on mips.com, > > instead a link is placed to the last time the web archive > > has crawled it. > > > > Documentation/admin-guide/hw-vuln/spectre.rst | 6 +++--- > > 1 file changed, 3 insertions(+), 3 deletions(-) > > I sure wish I understood why companies feel such a need to break links > so often ... I've applied this, thanks. Sorry about that, I have let the Intel team know about the broken links. And requested them to make sure that this does not happen again in the future.
© 2016 - 2025 Red Hat, Inc.