AVR was/is not affected by CVE-2017-5753, thus applies as obvious.

Johann

--

gcc/
        PR target/86776
        * config/avr/avr.cc (TARGET_HAVE_SPECULATION_SAFE_VALUE): Define
        to speculation_safe_value_not_needed.


diff --git a/gcc/config/avr/avr.cc b/gcc/config/avr/avr.cc
index c3e0995dfc3..a297f4e092a 100644
--- a/gcc/config/avr/avr.cc
+++ b/gcc/config/avr/avr.cc
@@ -15309,6 +15309,12 @@ avr_float_lib_compare_returns_bool (machine_mode mode, enum rtx_code)
 #undef  TARGET_CANONICALIZE_COMPARISON
 #define TARGET_CANONICALIZE_COMPARISON avr_canonicalize_comparison

+/* According to the opening comment in PR86772, the following applies:
+  "If the port does not (and never will in the future) need to mitigate
+   against unsafe speculation."  */
+#undef  TARGET_HAVE_SPECULATION_SAFE_VALUE
+#define TARGET_HAVE_SPECULATION_SAFE_VALUE speculation_safe_value_not_needed
+
 struct gcc_target targetm = TARGET_INITIALIZER;

 ^L

Reply via email to