forked from pool/MozillaFirefox
c9ea1238e9
MFSA 2022-47 (bsc#1205270) * CVE-2022-45403 (bmo#1762078) Service Workers might have learned size of cross-origin media files * CVE-2022-45404 (bmo#1790815) Fullscreen notification bypass * CVE-2022-45405 (bmo#1791314) Use-after-free in InputStream implementation * CVE-2022-45406 (bmo#1791975) Use-after-free of a JavaScript Realm * CVE-2022-45407 (bmo#1793314) Loading fonts on workers was not thread-safe * CVE-2022-45408 (bmo#1793829) Fullscreen notification bypass via windowName * CVE-2022-45409 (bmo#1796901) Use-after-free in Garbage Collection * CVE-2022-45410 (bmo#1658869) ServiceWorker-intercepted requests bypassed SameSite cookie policy * CVE-2022-45411 (bmo#1790311) Cross-Site Tracing was possible via non-standard override headers * CVE-2022-45412 (bmo#1791029) Symlinks may resolve to partially uninitialized buffers * CVE-2022-45413 (bmo#1791201) SameSite=Strict cookies could have been sent cross-site via intent URLs * CVE-2022-40674 (bmo#1791598) Use-after-free vulnerability in expat * CVE-2022-45415 (bmo#1793551) Downloaded file may have been saved with malicious extension * CVE-2022-45416 (bmo#1793676) OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=1019
28 lines
910 B
Diff
28 lines
910 B
Diff
# HG changeset patch
|
|
# User Wolfgang Rosenauer <wr@rosenauer.org>
|
|
# Parent e583ac9b86ba82dd1c60d307115b4cb96296a6af
|
|
# References: bmo#1792159 - Add missing includes to AtomicOperationsGenerated.h
|
|
|
|
diff --git a/mozglue/misc/SIMD_avx2.cpp b/mozglue/misc/SIMD_avx2.cpp
|
|
--- a/mozglue/misc/SIMD_avx2.cpp
|
|
+++ b/mozglue/misc/SIMD_avx2.cpp
|
|
@@ -53,17 +53,17 @@ template <typename TValue>
|
|
}
|
|
if (sizeof(TValue) == 2) {
|
|
return _mm256_cmpeq_epi16(a, b);
|
|
}
|
|
|
|
return _mm256_cmpeq_epi64(a, b);
|
|
}
|
|
|
|
-# if defined(__GNUC__) && !defined(__clang__)
|
|
+# if 0
|
|
|
|
// See the comment in SIMD.cpp over Load32BitsIntoXMM. This is just adapted
|
|
// from that workaround. Testing this, it also yields the correct instructions
|
|
// across all tested compilers.
|
|
__m128i Load64BitsIntoXMM(uintptr_t ptr) {
|
|
int64_t tmp;
|
|
memcpy(&tmp, reinterpret_cast<const void*>(ptr), sizeof(tmp));
|
|
return _mm_cvtsi64_si128(tmp);
|