Visible to Intel only — GUID: GUID-B4CEEFE3-DE54-4156-851C-ED3320AA6963
Visible to Intel only — GUID: GUID-B4CEEFE3-DE54-4156-851C-ED3320AA6963
mconditional-branch, Qconditional-branch
Lets you identify and fix code that may be vulnerable to speculative execution side-channel attacks, which can leak your secure data as a result of bad speculation of a conditional branch direction. This feature is only available for ifort.
Syntax
Linux: |
-mconditional-branch=keyword |
macOS: |
-mconditional-branch=keyword |
Windows: |
/Qconditional-branch:keyword |
Arguments
keyword |
Tells the compiler the action to take. Possible values are:
|
Default
-mconditional-branch=keep and /Qconditional-branch:keep |
The compiler does not attempt any vulnerable code detection or fixing. |
Description
This option lets you identify code that may be vulnerable to speculative execution side-channel attacks, which can leak your secure data as a result of bad speculation of a conditional branch direction. Depending on the setting you choose, vulnerabilities may be detected and code may be generated to attempt to mitigate the security risk.
IDE Equivalent
Visual Studio: Code Generation > Spectre Variant 1 Mitigation
Alternate Options
None