Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
michael@0 | 1 | /* This Source Code Form is subject to the terms of the Mozilla Public |
michael@0 | 2 | * License, v. 2.0. If a copy of the MPL was not distributed with this |
michael@0 | 3 | * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
michael@0 | 4 | |
michael@0 | 5 | #include <xmmintrin.h> |
michael@0 | 6 | #include <emmintrin.h> |
michael@0 | 7 | |
michael@0 | 8 | /* Before Nehalem _mm_loadu_si128 could be very slow, this trick is a little |
michael@0 | 9 | * faster. Once enough people are on architectures where _mm_loadu_si128 is |
michael@0 | 10 | * fast we can migrate to it. |
michael@0 | 11 | */ |
michael@0 | 12 | MOZ_ALWAYS_INLINE __m128i loadUnaligned128(const __m128i *aSource) |
michael@0 | 13 | { |
michael@0 | 14 | // Yes! We use uninitialized memory here, we'll overwrite it though! |
michael@0 | 15 | __m128 res = _mm_loadl_pi(_mm_set1_ps(0), (const __m64*)aSource); |
michael@0 | 16 | return _mm_castps_si128(_mm_loadh_pi(res, ((const __m64*)(aSource)) + 1)); |
michael@0 | 17 | } |