[Bug target/86805] sh port needs updating for CVE-2017-5753

2019-09-28 Thread olegendo at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86805 Oleg Endo changed: What|Removed |Added Status|UNCONFIRMED |RESOLVED Resolution|---

[Bug target/86805] sh port needs updating for CVE-2017-5753

2019-09-28 Thread olegendo at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86805 --- Comment #3 from Oleg Endo --- Author: olegendo Date: Sat Sep 28 08:55:03 2019 New Revision: 276245 URL: https://gcc.gnu.org/viewcvs?rev=276245&root=gcc&view=rev Log: gcc/ 2019-09-28 Oleg Endo Backport from mainline 2019-0

[Bug target/86805] sh port needs updating for CVE-2017-5753

2019-09-28 Thread olegendo at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86805 --- Comment #2 from Oleg Endo --- Author: olegendo Date: Sat Sep 28 08:53:27 2019 New Revision: 276244 URL: https://gcc.gnu.org/viewcvs?rev=276244&root=gcc&view=rev Log: gcc/ 2019-09-28 Oleg Endo PR target/86805 * config/sh/s

[Bug target/86805] sh port needs updating for CVE-2017-5753

2018-08-01 Thread olegendo at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86805 --- Comment #1 from Oleg Endo --- I'm not aware of any SH implementations that do speculative execution or data access. So I guess #undef TARGET_HAVE_SPECULATION_SAFE_VALUE #define TARGET_HAVE_SPECULATION_SAFE_VALUE speculation_safe_value_not_