Lets you identify and fix code that may be vulnerable to speculative execution side-channel attacks, which can leak your secure data as a result of bad speculation of a conditional branch direction. This content is specific to C++; it does not apply to DPC++.
Linux: | -mconditional-branch=keyword |
Windows: | /Qconditional-branch:keyword |
keyword |
Tells the compiler the action to take. Possible values are:
|
-mconditional-branch=keep and /Qconditional-branch:keep |
The compiler does not attempt any vulnerable code detection or fixing. |
This option lets you identify code that may be vulnerable to speculative execution side-channel attacks, which can leak your secure data as a result of bad speculation of a conditional branch direction. Depending on the setting you choose, vulnerabilities may be detected and code may be generated to attempt to mitigate the security risk.
Visual Studio: Code Generation [Intel C++] > Spectre Variant 1 Mitigation
Eclipse: None
None