- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I am looking for implementing a custom software function in c/c++ that will mitigate spectre variant 2 and 4 ,
Variant 4 is CVE-2017-5754 Rogue Data Access
Variant 2 is (CVE-2017-5715) Branch target injection
I have a query on spectre insecurity threats to modern Intel CPUs on Windows OS. CVE-2017-5715, also known as spectre variant 2. Branch target injection spectre variant 2 can be mitigated using retpoline. I am unable to implement retpoline in c/c++ function. Can some one help?
I have seen retpoline solutions implemented in low level assemble language instructions posted on internet sites . Is it possible to implement retpoline using middleware language c/c++ and not low level assembly? Also to mitigate Variant 4 is CVE-2017-5754 Rogue Data Access using middleware language?
regards
sachin
- Tags:
- CC++
- Development Tools
- Intel® C++ Compiler
- Intel® Parallel Studio XE
- Intel® System Studio
- Optimization
- Parallel Computing
- Vectorization
Link Copied
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Have you visited this page https://software.intel.com/en-us/articles/using-intel-compilers-to-mitigate-speculative-execution-side-channel-issues?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Dear Hoang,
Thank you. I have seen this article. It says that retpoline can be implemented by setting options in Intel c/c++ compiler. It does not give solution for other c/c++ compilers that run on Intel x86 CPUs. I plan to use Microsoft Visual Studio c/c++ compiler
regards
sachin

- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page