search for: mi5

Displaying 12 results from an estimated 12 matches for "mi5".

Did you mean: mi
2011 Dec 06
1
[LLVMdev] Changing order of instructions
Given a segment of a MachineBasicBlock containing the instructions [MI4, MI5, MI6] at an arbitrary point, what would be the best way to change this segment with the same instructions in a different order, say, [MI5, MI6, MI4]? I looked into splice(), but it was impossible to hold iterators that remained valid before and after the splicing. I tried erase/remove() with...
2012 Jul 06
0
[LLVMdev] MachineOperand: Subreg defines and the Undef flag
...3 = B0 above. MI3:: %vreg31<def> = ADD_rr %vreg31<kill>, %vreg32:subreg_loreg<kill> // Use the lo subreg that was setup in MI1: .... .... MI4:: %vreg32<def> = COPY %vreg7; //Not trivial because 7 is not killed. This is the Copy C i.e. B1=A3. .... MI5:: Conditional jump back to start of the block. The coalesce coalesces the copy withouth realizing that the instruction that defined the source of the copy was a copy instruction that only copied a subreg not the whole register. In the event, we lose the lower subreg. Let me know If I am missing s...
2012 Jul 05
3
[LLVMdev] MachineOperand: Subreg defines and the Undef flag
Hi Jakob, Thanks for your reply. > > The <undef> flag goes on NewMI_1 because the virtual register B isn't live > before that instruction. > > But you probably shouldn't be doing this yourself. Your NewMI code isn't in > SSA form because B has multiple definitions. Just use a REG_SEQUENCE > instruction, and let the register allocator do the transformation
2009 Jul 11
4
Graphical text error in game (MI5)
Hi, have recently bought MI5 (Tales of Monkey Island), and I am currently trying to run it under wine in Ubuntu 9.04 and I am running the latest development version 1.1.25. I am running this over the latest stable version due to less graphical errors when trying to run the game. To get the game running I followed this guide p...
2017 May 31
1
CentOS 6.9, shredding a RAID
On 5/31/2017 12:46 PM, m.roth at 5-cent.us wrote: > Not dealing with "secret", dealing with HIPAA and PII data. And*sigh* > Homeland Security Theater dictates.... We run all used disks through a shredder before surplusing any systems, and we are just a manufacturing company dealing with internal corporate IT stuff. the shredder is a truck from a 'data destruction'
2017 May 31
0
CentOS 6.9, shredding a RAID
...nt to this particular instance, but for domestic disks I keep them (along with old credit cards, memory sticks etc) until I have the garden incinerator going. With a good bright red firebed the disks don't last long - some run out of the bottom as liquid aluminium. I'm pretty certain even MI5/NSA won't get much off congealed Al! -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: <http://lists.centos.org/pipermail/centos/attachments/20170531/449df1a0...
2012 Jul 06
2
[LLVMdev] MachineOperand: Subreg defines and the Undef flag
...> = ADD_rr %vreg31<kill>, %vreg32:subreg_loreg<kill> > // Use the lo subreg that was setup in MI1: > .... > .... > MI4:: %vreg32<def> = COPY %vreg7; //Not trivial > because 7 is not killed. This is the Copy C i.e. B1=A3. > .... > MI5:: Conditional jump back to start of the block. > > The coalesce coalesces the copy withouth realizing that the instruction that > defined the source of the copy was a copy instruction that only copied a > subreg not the whole register. > In the event, we lose the lower subreg. >...
2006 Sep 08
3
ISPConfig: Secure on Centos?
Just wanted to see if this tool was approved or disapproved of in the centos community as far as security is concerned. http://www.ispconfig.org/ I have noted that anything that is not a centos package is probably suspect, -so feel free to assure, or warn, at your leisure. Basically we are looking for a secure GUI based DNS admin tool, (I myself prefer an openbsd or centos dns machine and tyo
2017 May 31
3
CentOS 6.9, shredding a RAID
John R Pierce wrote: > On 5/31/2017 10:13 AM, m.roth at 5-cent.us wrote: >> If I had realized it would run this long, I would have used DBAN.... For >> single drives, I do, and choose DoD 5220.22-M (seven passes), which is >> *way* overkill these days... but I sign my name to a certificate that >> gets stuck on the outside of the server, meaning I, personally, am
2024 Oct 21
1
Security of ssh across a LAN, public key versus password
Hi David, > hmm, what I'm finding doesn't seem to use the FIDO challenge/response to the > server, instead it looks like a public/private key that's unlocked with a touch, > possibly storing the private key on the hardware dongle (but it seems like > there's still a key you need to put on the client system) > > Quoting from the yubikey website: > OpenSSH
2015 Oct 28
6
Detecting empty office doc containing virus macro
We are receiving LOTS of emails that contain empty XLS or DOC documents with embedded virus macros. These are getting past SPAMASSASSIN, Clamav and Kaspersky. I'm trying to write a filter for EXIM to block these emails but I need to know a good, quick, command-line to detect an empty doc with a macro. Is there anything available that I can use?? I have managed to write a PERL script to
2008 Jun 30
4
Rebuild of kernel 2.6.9-67.0.20.EL failure
Hello list. I'm trying to rebuild the 2.6.9.67.0.20.EL kernel, but it fails even without modifications. How did I try it? Created a (non-root) build environment (not a mock ) Installed the kernel.scr.rpm and did a rpmbuild -ba --target=`uname -m` kernel-2.6.spec 2> prep-err.log | tee prep-out.log The build failed at the end: Processing files: kernel-xenU-devel-2.6.9-67.0.20.EL Checking