From patchwork Thu Nov 23 18:09:51 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Georg-Johann Lay X-Patchwork-Id: 1867894 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=gjlay.de header.i=@gjlay.de header.a=rsa-sha256 header.s=strato-dkim-0002 header.b=rvq8CC4R; dkim=pass header.d=gjlay.de header.i=@gjlay.de header.a=ed25519-sha256 header.s=strato-dkim-0003 header.b=XpsHBm/f; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org (client-ip=8.43.85.97; helo=server2.sourceware.org; envelope-from=gcc-patches-bounces+incoming=patchwork.ozlabs.org@gcc.gnu.org; receiver=patchwork.ozlabs.org) Received: from server2.sourceware.org (server2.sourceware.org [8.43.85.97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4SbmP96G5gz1yRw for ; Fri, 24 Nov 2023 05:10:21 +1100 (AEDT) Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 287EE3857733 for ; Thu, 23 Nov 2023 18:10:18 +0000 (GMT) X-Original-To: gcc-patches@gcc.gnu.org Delivered-To: gcc-patches@gcc.gnu.org Received: from mo4-p00-ob.smtp.rzone.de (mo4-p00-ob.smtp.rzone.de [81.169.146.163]) by sourceware.org (Postfix) with ESMTPS id 526263858D33 for ; Thu, 23 Nov 2023 18:10:05 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 526263858D33 Authentication-Results: sourceware.org; dmarc=none (p=none dis=none) header.from=gjlay.de Authentication-Results: sourceware.org; spf=none smtp.mailfrom=gjlay.de ARC-Filter: OpenARC Filter v1.0.0 sourceware.org 526263858D33 Authentication-Results: server2.sourceware.org; arc=pass smtp.remote-ip=81.169.146.163 ARC-Seal: i=2; a=rsa-sha256; d=sourceware.org; s=key; t=1700763007; cv=pass; b=KOoU8R2AoKiO2GhZQukpd8EExsMSB/2w6C8xrkHVmK6VRnxKwPhOZd1aQafje+DVnchHIkJxZHfKtbjQDk4jfiJUnxEDb8vMZCdGgp8059RT0kogfb78hUhE0OLNeyWRBv9yjbZHN+lZVc+bof/IVle316iJ4o7gIOqGF9WfZRI= ARC-Message-Signature: i=2; a=rsa-sha256; d=sourceware.org; s=key; t=1700763007; c=relaxed/simple; bh=bNfxyDgM/DpwJx7w5Fy/TdOZpqRe7Dk3E9eK3dAl9hg=; h=DKIM-Signature:DKIM-Signature:Message-ID:Date:MIME-Version:To: From:Subject; b=f68U8E+s32yKuEN0+ZUpr+N5FPPTCUxJX1JJWDgXpg1DcdIykktZqfBJJ3SWYXW9TJo74NZv8wyoGvMykBt6ZkFB92E5hUm5M4FBnuHnTeNyfo/FQgTtmAv9SYzLxjjppkukJYIebjIM6EVOLYp5+nipJgFvgP1CYO9VgO28tYs= ARC-Authentication-Results: i=2; server2.sourceware.org ARC-Seal: i=1; a=rsa-sha256; t=1700763003; cv=none; d=strato.com; s=strato-dkim-0002; b=TQZteVwUhLFUbx4ZMXcNohJ30+qnK/WLeMg68wzBXit3y+spqhnziHQO4mbPgTpv8G YcXwmjr2LblGqypbmM5mYmbqehzK4uVuFzvo9QwLZdbQh3q2bmkzZ5/96iqpQLO4KG3y cGwQIyP72deJ781g8XvsmunNx8Tk57yAxHxlcTHpGr64QEf2bgGVMhBxeYtot//rOC1r Q4WHNibwtHPxmpv+eAjTzDNSYu7Y6976P9iczqXyZtRk+6Anoje1ogAyC9lI/es2691u JmiINxT+v1xZiHj4kTXgxa9g1lv5kEUldNQw+PPGIAEKeR3KyHN83kNX0fD2/SvzURzF 2nAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; t=1700763003; s=strato-dkim-0002; d=strato.com; h=Subject:From:To:Date:Message-ID:Cc:Date:From:Subject:Sender; bh=djCRjE63gLvneZHFeZarXW7Bn5egrw/per5XwG1ZJdw=; b=qjqPQ5A/I2XxI07TmSBpOHfcrcYA362DiJ8tR7D5K1ms263ujo+RhRdWooyaoati3b Ri1L4j0uFhGoZhmW01mdd1cJQfIE5JZEa/xTf4Mk3z79edTKKHcxK9Zk1xIhRlsGmisL F4zAoqOntUxUEmGhvQxml5/ErnsTM+KweV0IN5Eco4czUoPmSJZSHuLSNCaaG4Hbztuy KuLCnFwwG1fM02dT3V4FkPgqfjJZP0h48V4ooSOvfDa2fjs4d9RCKWW3QZvHIoSiu/ZD X+UNJ0iwgiDnK81F/oH6Gc1vOdpOdtMmsL91QnGoVLpsINI3Zch+fLl9+C+dBrdOYjP6 L9/Q== ARC-Authentication-Results: i=1; strato.com; arc=none; dkim=none X-RZG-CLASS-ID: mo00 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1700763003; s=strato-dkim-0002; d=gjlay.de; h=Subject:From:To:Date:Message-ID:Cc:Date:From:Subject:Sender; bh=djCRjE63gLvneZHFeZarXW7Bn5egrw/per5XwG1ZJdw=; b=rvq8CC4RgyncBXUwbjUzzBfShce4w5VMLrjMMoztOu2ETo32NxhBah4X+4NUf/Y9kQ DNbjqz1gnfq/7UxqPUsVzaYPePqG7UnhZ2hX6slFUAnZ6G909/NTEG2c8IY4eJ3ZT+T2 vsV51v/Q8eaxYHLulRs4/zxQMPjNJIe2egh6APLiR7tWbIAabuxQhoghhjVVX6rbUXVP Acj1V+E9vlojcSJJ8/4AmwR3oHW9sMV6CytJPSNWDiq5XoUk9HkFpkY8v2vnoSYylm9f Nx2z5odOFC3IeaEhFJd6Esr5J95v+YXV9/Z+OAVJ4We8yUY8UevO0ZGQbfZcqNmX9ZwO 8w9A== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; t=1700763003; s=strato-dkim-0003; d=gjlay.de; h=Subject:From:To:Date:Message-ID:Cc:Date:From:Subject:Sender; bh=djCRjE63gLvneZHFeZarXW7Bn5egrw/per5XwG1ZJdw=; b=XpsHBm/fPXpmRJGCQufs9sJaScAiGya3TTt4M+BOjq0ZTDs3lgZDqeEDU/W3GgqSnZ nz4MWlzDbtHBcYBgryCQ== X-RZG-AUTH: ":LXoWVUeid/7A29J/hMvvT3koxZnKT7Qq0xotTetVnKkbjtK7q2y9LkX3hYlnPQ==" Received: from [192.168.2.102] by smtp.strato.de (RZmta 49.9.1 DYNA|AUTH) with ESMTPSA id v1b9a8zANIA3PR3 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256 bits)) (Client did not present a certificate); Thu, 23 Nov 2023 19:10:03 +0100 (CET) Message-ID: Date: Thu, 23 Nov 2023 19:09:51 +0100 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Content-Language: en-US To: gcc-patches@gcc.gnu.org, Denis Chertykov From: Georg-Johann Lay Subject: [avr,committed] Fix PR86776 X-Spam-Status: No, score=-10.4 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, GIT_PATCH_0, KAM_NUMSUBJECT, RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H3, RCVD_IN_MSPIKE_WL, SPF_HELO_PASS, SPF_NONE, TXREP, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Gcc-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: gcc-patches-bounces+incoming=patchwork.ozlabs.org@gcc.gnu.org AVR was/is not affected by CVE-2017-5753, thus applies as obvious. Johann --- gcc/ PR target/86776 * config/avr/avr.cc (TARGET_HAVE_SPECULATION_SAFE_VALUE): Define to speculation_safe_value_not_needed. ^L diff --git a/gcc/config/avr/avr.cc b/gcc/config/avr/avr.cc index c3e0995dfc3..a297f4e092a 100644 --- a/gcc/config/avr/avr.cc +++ b/gcc/config/avr/avr.cc @@ -15309,6 +15309,12 @@ avr_float_lib_compare_returns_bool (machine_mode mode, enum rtx_code) #undef TARGET_CANONICALIZE_COMPARISON #define TARGET_CANONICALIZE_COMPARISON avr_canonicalize_comparison +/* According to the opening comment in PR86772, the following applies: + "If the port does not (and never will in the future) need to mitigate + against unsafe speculation." */ +#undef TARGET_HAVE_SPECULATION_SAFE_VALUE +#define TARGET_HAVE_SPECULATION_SAFE_VALUE speculation_safe_value_not_needed + struct gcc_target targetm = TARGET_INITIALIZER;