Displaying 4 results from an estimated 4 matches for "00063".
Did you mean:
0006
2016 Jan 24
4
Skip redundant checks in AliasSet::aliasesUnknownInst
Dear llvm contributors,
Could you please advise me how to skip
checks, which are performed in AliasSet::aliasesUnknownInst, of
unknown instructions from different alias sets of an alias set tracker
that is a parameter of ‘AliasSetTracker::add(const AliasSetTracker
&AST)’?
If this wasn’t available at the moment and someone could review me, I
would try to implement it. A temporary patch can be
2016 Jan 27
2
Skip redundant checks in AliasSet::aliasesUnknownInst
...>
> If that doesn't work, I suspect the way you get dupes is through mergeSetIn,
> so you also could probably just change:
>
> 00061 } else if (ASHadUnknownInsts) {
> 00062 UnknownInsts.insert(UnknownInsts.end(), AS.UnknownInsts.begin(),
> AS.UnknownInsts.end());
> 00063 AS.UnknownInsts.clear();
> 00064 }
>
>
>
> You could insert the current unknown insts into a smallptrset, and then only
> append them to UnknownInsts if they aren't in the set.
>
> This should remove your dupes.
>
>
>
> On Sun, Jan 24, 2016 at 5:28 AM,...
2016 Jan 27
2
Skip redundant checks in AliasSet::aliasesUnknownInst
...hrough
> mergeSetIn,
> > so you also could probably just change:
> >
> > 00061 } else if (ASHadUnknownInsts) {
> > 00062 UnknownInsts.insert(UnknownInsts.end(),
> AS.UnknownInsts.begin(),
> > AS.UnknownInsts.end());
> > 00063 AS.UnknownInsts.clear();
> > 00064 }
> >
> >
> >
> > You could insert the current unknown insts into a smallptrset,
> and then only
> > append them to UnknownInsts if they aren't in the set.
> >
> > Thi...
2003 Sep 16
9
FreeBSD Security Advisory FreeBSD-SA-03:12.openssh
...% /usr/sbin/sshd -\?
The version string is also displayed when a client connects to the
server.
To view the version string of the OpenSSH client, execute the
following command:
% /usr/bin/ssh -V
VII. References
<URL:http://www.mindrot.org/pipermail/openssh-unix-announce/2003-September/000063.html>
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2003-0693 to this issue.
<URL:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0693>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (FreeBSD)
iD8DBQE/Z1MtFdaIBMps37IRApcyAKCIjophc4...