On Thu, Jan 4, 2018 at 10:10 PM, Eric Gallager <eg...@gwmail.gwu.edu> wrote: > Is there anything GCC could be doing at the compiler level to mitigate > the recently-announced Meltdown and Spectre vulnerabilities? From > reading about them, it seems like they involve speculative execution > and indirect branch prediction, and those are the domain of things the > compiler deals with, right? (For reference, Meltdown is CVE-2017-5754, > and Spectre is CVE-2017-5753 and CVE-2017-5715) > > Just wondering, > Eric
Check out https://support.google.com/faqs/answer/7625886 and especially http://git.infradead.org/users/dwmw2/gcc-retpoline.git/shortlog/refs/heads/gcc-7_2_0-retpoline-20171219 I'd love to hear what other people have heard! Will