aboutsummaryrefslogtreecommitdiffstats
path: root/gcc-4.9/gcc/config/i386/i386-opts.h
diff options
context:
space:
mode:
authorJoonas Kylmälä <joonas.kylmala@iki.fi>2018-08-27 14:09:09 -0400
committerJoonas Kylmälä <joonas.kylmala@iki.fi>2018-08-27 14:09:09 -0400
commit989f332ea4e1ac952625139fbd7c18e8a8b31c8a (patch)
tree28f03931fa1c2148a015d59d9855bf976231101a /gcc-4.9/gcc/config/i386/i386-opts.h
parentb0c259403b7b74b55fc93f50fd1f2fbae3510ece (diff)
parenta74813a825e49267faa0b2ba45e9cd4bd6ccf4f4 (diff)
downloadtoolchain_gcc-replicant-6.0.tar.gz
toolchain_gcc-replicant-6.0.tar.bz2
toolchain_gcc-replicant-6.0.zip
Diffstat (limited to 'gcc-4.9/gcc/config/i386/i386-opts.h')
-rw-r--r--gcc-4.9/gcc/config/i386/i386-opts.h13
1 files changed, 13 insertions, 0 deletions
diff --git a/gcc-4.9/gcc/config/i386/i386-opts.h b/gcc-4.9/gcc/config/i386/i386-opts.h
index 47a34dbf7..f44620781 100644
--- a/gcc-4.9/gcc/config/i386/i386-opts.h
+++ b/gcc-4.9/gcc/config/i386/i386-opts.h
@@ -93,4 +93,17 @@ enum stack_protector_guard {
SSP_GLOBAL /* global canary */
};
+/* This is used to mitigate variant #2 of the speculative execution
+ vulnerabilities on x86 processors identified by CVE-2017-5715, aka
+ Spectre. They convert indirect branches and function returns to
+ call and return thunks to avoid speculative execution via indirect
+ call, jmp and ret. */
+enum indirect_branch {
+ indirect_branch_unset = 0,
+ indirect_branch_keep,
+ indirect_branch_thunk,
+ indirect_branch_thunk_inline,
+ indirect_branch_thunk_extern
+};
+
#endif