diff options
Diffstat (limited to 'gcc-4.9/gcc/config/i386/i386-opts.h')
-rw-r--r-- | gcc-4.9/gcc/config/i386/i386-opts.h | 11 |
1 files changed, 5 insertions, 6 deletions
diff --git a/gcc-4.9/gcc/config/i386/i386-opts.h b/gcc-4.9/gcc/config/i386/i386-opts.h index e98cd8c1e..f44620781 100644 --- a/gcc-4.9/gcc/config/i386/i386-opts.h +++ b/gcc-4.9/gcc/config/i386/i386-opts.h @@ -93,6 +93,11 @@ enum stack_protector_guard { SSP_GLOBAL /* global canary */ }; +/* This is used to mitigate variant #2 of the speculative execution + vulnerabilities on x86 processors identified by CVE-2017-5715, aka + Spectre. They convert indirect branches and function returns to + call and return thunks to avoid speculative execution via indirect + call, jmp and ret. */ enum indirect_branch { indirect_branch_unset = 0, indirect_branch_keep, @@ -101,10 +106,4 @@ enum indirect_branch { indirect_branch_thunk_extern }; -enum indirect_branch_loop { - indirect_branch_loop_lfence, - indirect_branch_loop_pause, - indirect_branch_loop_nop -}; - #endif |