Intel® C++ Compiler
Community support and assistance for creating C++ code that runs on platforms based on Intel® processors.
7953 Discussions

mitigate spectre variant 2 and 4 using middleware language and not low level assembly

schav7
Beginner
408 Views

I am looking for implementing a custom software function in c/c++ that will mitigate spectre variant 2 and 4 ,

Variant 4 is CVE-2017-5754 Rogue Data Access

Variant 2 is (CVE-2017-5715) Branch target injection

I have a query on spectre insecurity threats to modern Intel CPUs on Windows OS. CVE-2017-5715, also known as spectre variant 2. Branch target injection spectre variant 2 can be mitigated using retpoline. I am unable to implement retpoline in c/c++ function. Can some one help?

I have seen retpoline solutions implemented in low level assemble language instructions posted on internet sites . Is it possible to implement retpoline using middleware language c/c++ and not low level assembly? Also to mitigate Variant 4 is CVE-2017-5754 Rogue Data Access using  middleware language?

regards

sachin

0 Kudos
2 Replies
Viet_H_Intel
Moderator
408 Views

Have you visited this page https://software.intel.com/en-us/articles/using-intel-compilers-to-mitigate-speculative-execution-side-channel-issues? 

0 Kudos
schav7
Beginner
408 Views

Dear Hoang,

Thank you. I have seen this article. It says that retpoline can be implemented by setting options in Intel c/c++ compiler. It does not give solution for other c/c++ compilers that run on Intel x86 CPUs. I plan to use Microsoft Visual Studio c/c++ compiler

regards

sachin

0 Kudos
Reply