Displaying 12 results from an estimated 12 matches for "mi5".
Did you mean:
mi
2011 Dec 06
1
[LLVMdev] Changing order of instructions
Given a segment of a MachineBasicBlock containing the instructions [MI4,
MI5, MI6] at an arbitrary point, what would be the best way to change
this segment with the same instructions in a different order, say, [MI5,
MI6, MI4]?
I looked into splice(), but it was impossible to hold iterators that
remained valid before and after the splicing. I tried erase/remove()
with...
2012 Jul 06
0
[LLVMdev] MachineOperand: Subreg defines and the Undef flag
...3 = B0 above.
MI3:: %vreg31<def> = ADD_rr %vreg31<kill>, %vreg32:subreg_loreg<kill>
// Use the lo subreg that was setup in MI1:
....
....
MI4:: %vreg32<def> = COPY %vreg7; //Not trivial
because 7 is not killed. This is the Copy C i.e. B1=A3.
....
MI5:: Conditional jump back to start of the block.
The coalesce coalesces the copy withouth realizing that the instruction that
defined the source of the copy was a copy instruction that only copied a
subreg not the whole register.
In the event, we lose the lower subreg.
Let me know If I am missing s...
2012 Jul 05
3
[LLVMdev] MachineOperand: Subreg defines and the Undef flag
Hi Jakob,
Thanks for your reply.
>
> The <undef> flag goes on NewMI_1 because the virtual register B isn't live
> before that instruction.
>
> But you probably shouldn't be doing this yourself. Your NewMI code isn't
in
> SSA form because B has multiple definitions. Just use a REG_SEQUENCE
> instruction, and let the register allocator do the transformation
2009 Jul 11
4
Graphical text error in game (MI5)
Hi, have recently bought MI5 (Tales of Monkey Island), and I am currently trying to run it under wine in Ubuntu 9.04 and I am running the latest development version 1.1.25. I am running this over the latest stable version due to less graphical errors when trying to run the game.
To get the game running I followed this guide p...
2017 May 31
1
CentOS 6.9, shredding a RAID
On 5/31/2017 12:46 PM, m.roth at 5-cent.us wrote:
> Not dealing with "secret", dealing with HIPAA and PII data. And*sigh*
> Homeland Security Theater dictates....
We run all used disks through a shredder before surplusing any systems,
and we are just a manufacturing company dealing with internal corporate
IT stuff. the shredder is a truck from a 'data destruction'
2017 May 31
0
CentOS 6.9, shredding a RAID
...nt to this particular instance, but for domestic disks I keep
them (along with old credit cards, memory sticks etc) until I have the
garden incinerator going. With a good bright red firebed the disks
don't last long - some run out of the bottom as liquid aluminium. I'm
pretty certain even MI5/NSA won't get much off congealed Al!
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: OpenPGP digital signature
URL: <http://lists.centos.org/pipermail/centos/attachments/20170531/449df1a0...
2012 Jul 06
2
[LLVMdev] MachineOperand: Subreg defines and the Undef flag
...> = ADD_rr %vreg31<kill>, %vreg32:subreg_loreg<kill>
> // Use the lo subreg that was setup in MI1:
> ....
> ....
> MI4:: %vreg32<def> = COPY %vreg7; //Not trivial
> because 7 is not killed. This is the Copy C i.e. B1=A3.
> ....
> MI5:: Conditional jump back to start of the block.
>
> The coalesce coalesces the copy withouth realizing that the instruction that
> defined the source of the copy was a copy instruction that only copied a
> subreg not the whole register.
> In the event, we lose the lower subreg.
>...
2006 Sep 08
3
ISPConfig: Secure on Centos?
Just wanted to see if this tool was approved or disapproved of in the
centos community as far as security is concerned.
http://www.ispconfig.org/
I have noted that anything that is not a centos package is probably
suspect, -so feel free to assure, or warn, at your leisure.
Basically we are looking for a secure GUI based DNS admin tool, (I myself
prefer an openbsd or centos dns machine and tyo
2017 May 31
3
CentOS 6.9, shredding a RAID
John R Pierce wrote:
> On 5/31/2017 10:13 AM, m.roth at 5-cent.us wrote:
>> If I had realized it would run this long, I would have used DBAN.... For
>> single drives, I do, and choose DoD 5220.22-M (seven passes), which is
>> *way* overkill these days... but I sign my name to a certificate that
>> gets stuck on the outside of the server, meaning I, personally, am
2024 Oct 21
1
Security of ssh across a LAN, public key versus password
Hi David,
> hmm, what I'm finding doesn't seem to use the FIDO challenge/response to the
> server, instead it looks like a public/private key that's unlocked with a touch,
> possibly storing the private key on the hardware dongle (but it seems like
> there's still a key you need to put on the client system)
>
> Quoting from the yubikey website:
> OpenSSH
2015 Oct 28
6
Detecting empty office doc containing virus macro
We are receiving LOTS of emails that contain empty XLS or DOC documents with
embedded virus macros. These are getting past SPAMASSASSIN, Clamav and
Kaspersky.
I'm trying to write a filter for EXIM to block these emails but I need to know
a good, quick, command-line to detect an empty doc with a macro.
Is there anything available that I can use??
I have managed to write a PERL script to
2008 Jun 30
4
Rebuild of kernel 2.6.9-67.0.20.EL failure
Hello list.
I'm trying to rebuild the 2.6.9.67.0.20.EL kernel, but it fails even without
modifications.
How did I try it?
Created a (non-root) build environment (not a mock )
Installed the kernel.scr.rpm and did a
rpmbuild -ba --target=`uname -m` kernel-2.6.spec 2> prep-err.log | tee
prep-out.log
The build failed at the end:
Processing files: kernel-xenU-devel-2.6.9-67.0.20.EL
Checking