d7bd7a8ae8
The original AVX patch used a function pointer to handle the difference between machines with and without AVX support. This is insecure. A well-placed memory exploit could lead to redirection of the execution. Using a variable and several tests is a bit slower but cannot be exploited in this way. |
||
---|---|---|
.. | ||
generic | ||
gnu | ||
i386 | ||
ia64 | ||
ieee754 | ||
mach | ||
posix | ||
powerpc | ||
pthread | ||
s390 | ||
sh | ||
sparc | ||
unix | ||
wordsize-32 | ||
wordsize-64 | ||
x86_64 |