Richard,

Could you review this series and let us know if this is acceptable for Phase 3?
This is a security-relevant (a Spectre variant 2 mitigation) for the Ampere 
eMAG…

Thanks,
Philipp.

> On 09.12.2020, at 18:21, Christoph Müllner 
> <christoph.muell...@theobroma-systems.com> wrote:
> 
> aarch64 already uses a C-function for indirect calls
> (aarch64_indirect_call_asm()). So let's add the same
> abstraction for indirect branches.
> 
> This patch has no functional consequence.
> 
> gcc/
>        * config/aarch64/aarch64.c (aarch64_indirect_branch_asm): Add
>       function to output indirect branch instructions.
>        * config/aarch64/aarch64.md (indirect_jump): Invoke
>        aarch64_indirect_branch_asm() instead of outputting instructions
>        direclty.
>        * config/aarch64/aarch64.md (sibcall_insn): Likewise.
>        * config/aarch64/aarch64.md (sibcall_value_insn): Likewise.
> ---
> gcc/config/aarch64/aarch64-protos.h | 1 +
> gcc/config/aarch64/aarch64.c        | 7 +++++++
> gcc/config/aarch64/aarch64.md       | 6 +++---
> 3 files changed, 11 insertions(+), 3 deletions(-)
> 
> diff --git a/gcc/config/aarch64/aarch64-protos.h 
> b/gcc/config/aarch64/aarch64-protos.h
> index 2aa3f1fddaa..91ae8b7a0f9 100644
> --- a/gcc/config/aarch64/aarch64-protos.h
> +++ b/gcc/config/aarch64/aarch64-protos.h
> @@ -802,6 +802,7 @@ extern const atomic_ool_names aarch64_ool_ldeor_names;
> tree aarch64_resolve_overloaded_builtin_general (location_t, tree, void *);
> 
> const char *aarch64_sls_barrier (int);
> +const char *aarch64_indirect_branch_asm (rtx);
> const char *aarch64_indirect_call_asm (rtx);
> extern bool aarch64_harden_sls_retbr_p (void);
> extern bool aarch64_harden_sls_blr_p (void);
> diff --git a/gcc/config/aarch64/aarch64.c b/gcc/config/aarch64/aarch64.c
> index 264ccb8beb2..4799679f9e5 100644
> --- a/gcc/config/aarch64/aarch64.c
> +++ b/gcc/config/aarch64/aarch64.c
> @@ -23659,6 +23659,13 @@ aarch64_asm_file_end ()
> #endif
> }
> 
> +const char *
> +aarch64_indirect_branch_asm (rtx addr)
> +{
> +  output_asm_insn ("br\t%0", &addr);
> +  return "";
> +}
> +
> const char *
> aarch64_indirect_call_asm (rtx addr)
> {
> diff --git a/gcc/config/aarch64/aarch64.md b/gcc/config/aarch64/aarch64.md
> index eed06de3240..5cf660cc19f 100644
> --- a/gcc/config/aarch64/aarch64.md
> +++ b/gcc/config/aarch64/aarch64.md
> @@ -471,7 +471,7 @@
>   [(set (pc) (match_operand:DI 0 "register_operand" "r"))]
>   ""
>   {
> -    output_asm_insn ("br\\t%0", operands);
> +    aarch64_indirect_branch_asm (operands[0]);
>     return aarch64_sls_barrier (aarch64_harden_sls_retbr_p ());
>   }
>   [(set_attr "type" "branch")
> @@ -1104,7 +1104,7 @@
>   {
>     if (which_alternative == 0)
>       {
> -     output_asm_insn ("br\\t%0", operands);
> +     aarch64_indirect_branch_asm (operands[0]);
>       return aarch64_sls_barrier (aarch64_harden_sls_retbr_p ());
>       }
>     return "b\\t%c0";
> @@ -1124,7 +1124,7 @@
>   {
>     if (which_alternative == 0)
>       {
> -     output_asm_insn ("br\\t%1", operands);
> +     aarch64_indirect_branch_asm (operands[1]);
>       return aarch64_sls_barrier (aarch64_harden_sls_retbr_p ());
>       }
>     return "b\\t%c1";
> -- 
> 2.29.2
> 

Reply via email to