search for: 00063

Displaying 4 results from an estimated 4 matches for "00063".

Did you mean: 0006
2016 Jan 24
4
Skip redundant checks in AliasSet::aliasesUnknownInst
Dear llvm contributors, Could you please advise me how to skip checks, which are performed in AliasSet::aliasesUnknownInst, of unknown instructions from different alias sets of an alias set tracker that is a parameter of ‘AliasSetTracker::add(const AliasSetTracker &AST)’? If this wasn’t available at the moment and someone could review me, I would try to implement it. A temporary patch can be
2016 Jan 27
2
Skip redundant checks in AliasSet::aliasesUnknownInst
...> > If that doesn't work, I suspect the way you get dupes is through mergeSetIn, > so you also could probably just change: > > 00061 } else if (ASHadUnknownInsts) { > 00062 UnknownInsts.insert(UnknownInsts.end(), AS.UnknownInsts.begin(), > AS.UnknownInsts.end()); > 00063 AS.UnknownInsts.clear(); > 00064 } > > > > You could insert the current unknown insts into a smallptrset, and then only > append them to UnknownInsts if they aren't in the set. > > This should remove your dupes. > > > > On Sun, Jan 24, 2016 at 5:28 AM,...
2016 Jan 27
2
Skip redundant checks in AliasSet::aliasesUnknownInst
...hrough > mergeSetIn, > > so you also could probably just change: > > > > 00061 } else if (ASHadUnknownInsts) { > > 00062 UnknownInsts.insert(UnknownInsts.end(), > AS.UnknownInsts.begin(), > > AS.UnknownInsts.end()); > > 00063 AS.UnknownInsts.clear(); > > 00064 } > > > > > > > > You could insert the current unknown insts into a smallptrset, > and then only > > append them to UnknownInsts if they aren't in the set. > > > > Thi...
2003 Sep 16
9
FreeBSD Security Advisory FreeBSD-SA-03:12.openssh
...% /usr/sbin/sshd -\? The version string is also displayed when a client connects to the server. To view the version string of the OpenSSH client, execute the following command: % /usr/bin/ssh -V VII. References <URL:http://www.mindrot.org/pipermail/openssh-unix-announce/2003-September/000063.html> The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0693 to this issue. <URL:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0693> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3 (FreeBSD) iD8DBQE/Z1MtFdaIBMps37IRApcyAKCIjophc4...