[Bug target/86805] sh port needs updating for CVE-2017-5753

olegendo at gcc dot gnu.org gcc-bugzilla@gcc.gnu.org
Wed Aug 1 12:07:00 GMT 2018


https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86805

--- Comment #1 from Oleg Endo <olegendo at gcc dot gnu.org> ---
I'm not aware of any SH implementations that do speculative execution or data
access.  So I guess 

#undef TARGET_HAVE_SPECULATION_SAFE_VALUE
#define TARGET_HAVE_SPECULATION_SAFE_VALUE speculation_safe_value_not_needed.

will suffice.


More information about the Gcc-bugs mailing list