Bug 86772 - [meta-bug] tracking port status for CVE-2017-5753
Summary: [meta-bug] tracking port status for CVE-2017-5753
Status: NEW
Alias: None
Product: gcc
Classification: Unclassified
Component: target (show other bugs)
Version: 9.0
: P3 normal
Target Milestone: ---
Assignee: Not yet assigned to anyone
URL:
Keywords: meta-bug
Depends on: 86774 86775 86777 86778 86780 86783 86786 86788 86792 86796 86802 86811 86776 86779 86781 86782 86784 86785 86787 86789 86790 86791 86793 86794 86795 86797 86798 86799 86800 86801 86803 86804 86805 86806 86807 86808 86809 86810 86812 86813 86814 86951
Blocks:
  Show dependency treegraph
 
Reported: 2018-08-01 09:45 UTC by Richard Earnshaw
Modified: 2019-01-27 23:41 UTC (History)
2 users (show)

See Also:
Host:
Target:
Build:
Known to work:
Known to fail:
Last reconfirmed: 2018-08-08 00:00:00


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Richard Earnshaw 2018-08-01 09:45:35 UTC
This is a meta bug to track the port status of all ports that have not yet been updated to handle CVE-2017-5753 (Spectre variant 1).

If your port does (or might in the future) need to mitigate against unsafe speculation, then you will need to define (at a minimum) a "speculation_barrier" insn.

If your port does not (and never will in the future) need to mitigate against unsafe speculation, you can simply add

#undef TARGET_HAVE_SPECULATION_SAFE_VALUE
#define TARGET_HAVE_SPECULATION_SAFE_VALUE speculation_safe_value_not_needed.

to your target defines.
Comment 1 Richard Earnshaw 2018-08-01 09:50:49 UTC
Original patch series and discussion can be found here: 

https://gcc.gnu.org/ml/gcc-patches/2018-07/msg01700.html
Comment 2 Andrew Pinski 2018-08-08 21:25:49 UTC
.
Comment 3 Michael Eager 2019-01-27 23:41:51 UTC
MicroBlaze does not do speculative execution.  No action needed.