On Thu, Jan 4, 2018 at 10:10 PM, Eric Gallager <eg...@gwmail.gwu.edu> wrote:
> Is there anything GCC could be doing at the compiler level to mitigate
> the recently-announced Meltdown and Spectre vulnerabilities? From
> reading about them, it seems like they involve speculative execution
> and indirect branch prediction, and those are the domain of things the
> compiler deals with, right? (For reference, Meltdown is CVE-2017-5754,
> and Spectre is CVE-2017-5753 and CVE-2017-5715)
>
> Just wondering,
> Eric

Check out

https://support.google.com/faqs/answer/7625886

and especially

http://git.infradead.org/users/dwmw2/gcc-retpoline.git/shortlog/refs/heads/gcc-7_2_0-retpoline-20171219

I'd love to hear what other people have heard!

Will

Reply via email to