Is there anything GCC could be doing at the compiler level to mitigate
the recently-announced Meltdown and Spectre vulnerabilities? From
reading about them, it seems like they involve speculative execution
and indirect branch prediction, and those are the domain of things the
compiler deals with, right? (For reference, Meltdown is CVE-2017-5754,
and Spectre is CVE-2017-5753 and CVE-2017-5715)

Just wondering,
Eric

Reply via email to