Content Security Policy: The page’s settings blocked the loading of a resource at inline (“script-src”). gaoptout.js:1:322
Content Security Policy: The page’s settings blocked the loading of a resource at inline (“script-src”). content.js:149:48
Layout was forced before the page was fully loaded. If stylesheets are not yet loaded this may cause a flash of unstyled content. node.js:383
Content Security Policy: The page’s settings blocked the loading of a resource at inline (“style-src”). load_progress_bar.js:79:30
Content Security Policy: The page’s settings blocked the loading of a resource at inline (“style-src”). load_progress_bar.js:54:12
Content Security Policy: The page’s settings blocked the loading of a resource at inline (“style-src”). 2 load_progress_bar.js:91:31
Content Security Policy: The page’s settings blocked the loading of a resource at inline (“script-src”). inject.js:221:46
Content Security Policy: The page’s settings blocked the loading of a resource at inline (“style-src”). 2 load_prog
000013 165174 177412 177412 | |
$L 173442 | |
$Sÿ | |
RT-11SJ V04.00 | |
.D 56=5015 | |
.TYPE V4USER.TXT | |
Welcome to RT-11 Version 4. RT-11 V04 provides new hardware support | |
and some major enhancements over Version 3B. |
1 .title PDP11GUI RK05 sector loader/writer for RK11 controller | |
2 | |
3 ; This code reads or writes one sector from a RK05 into memory | |
4 ; It is used by PDP11GUI to access a RK05 disc | |
5 ; | |
6 ; See | |
7 ; RK11-D and RK11-E moving head disk drive controller manual (Aug 1973, DEC-11-HRKDA-B-D).pdf | |
8 ; | |
9 ; !!! DO NOT CHANGE file name, | |
10 ; !!! entry labels, |
{ | |
"build": { | |
"arduino": { | |
"ldscript": "flash_with_bootloader.ld" | |
}, | |
"core": "moteino", | |
"cpu": "cortex-m4", | |
"extra_flags": "-D__SAMD51__ -D__SAMD51J19A__ -DRFGATEWAY_M4 -D__FPU_PRESENT -DARM_MATH_CM4 -mfloat-abi=hard -mfpu=fpv4-sp-d16", | |
"f_cpu": "120000000L", | |
"hwids": [ |
If you want to write 6502 machine code like a devout Christian, you need to understand that God is in the opcodes. Every single instruction is a divine message, and it is your job to interpret it.
For example, take the opcode LDA #$01. This opcode loads the value 1 into the accumulator. But what does that mean?
Well, according to Christian tradition, the number 1 is a symbol of God. So, this opcode is telling you to load God into the accumulator. That's pretty powerful stuff!
But it doesn't stop there. Every other opcode has a similar meaning. For example, STA $0200 is telling you to store the accumulator at address $0200. But what does that mean?
Well, $0200 is the address of the first byte of video memory. So, this opcode is telling you to store God in the first byte of video memory. That's an incredibly powerful message!
[ 7.052063] input: Goodix Capacitive TouchScreen as /devices/platform/i2c@0/i2c-22/22-0014/input/input0 | |
[ 7.079070] ------------[ cut here ]------------ | |
[ 7.079105] WARNING: CPU: 0 PID: 391 at drivers/gpio/gpiolib.c:3323 gpiochip_enable_irq+0x88/0xa8 | |
[ 7.079114] Modules linked in: goodix(+) 8021q garp stp llc brcmfmac brcmutil bcm2835_v4l2(C) videobuf2_vmalloc cfg80211 rfkill bcm2835_isp(C) bcm2835_codec(C) bcm2835_mmal_vchiq(C) v4l2_mem2mem raspberrypi_hwmon videobuf2_dma_contig videobuf2_memops videobuf2_v4l2 videobuf2_common snd_bcm2835(C) videodev snd_pcm snd_timer mc vc_sm_cma(C) snd panel_simple rpivid_mem nvmem_rmem gpio_backlight i2c_gpio uio_pdrv_genirq i2c_algo_bit uio drm drm_panel_orientation_quirks backlight fuse ip_tables x_tables ipv6 | |
[ 7.079483] CPU: 0 PID: 391 Comm: modprobe Tainted: G C 5.10.90-v7l+ #1 | |
[ 7.079492] Hardware name: BCM2711 | |
[ 7.079502] Backtrace: | |
[ 7.079536] [<c0bb8a10>] (dump_backtrace) from [<c0bb8d84>] (show_stack+0x20/0x24) | |
[ 7.07955 |
diff --git a/build/moz.configure/toolchain.configure b/build/moz.configure/toolchain.configure | |
index 9c772a8b7594..9b7ced38daad 100755 | |
--- a/build/moz.configure/toolchain.configure | |
+++ b/build/moz.configure/toolchain.configure | |
@@ -582,7 +582,7 @@ def get_vc_paths(topsrcdir): | |
'x86': [os.path.join(path, r'VC\bin\amd64_x86'), os.path.join(path, r'VC\bin\amd64')], | |
}) | |
# Then VS2017 and newer. | |
- for install in vswhere(['-requires', 'Microsoft.VisualStudio.Component.VC.Tools.x86.x64']): | |
+ for install in vswhere(['-requires', 'Microsoft.VisualStudio.Component.VC.Tools.x86.x64', '-products', '*']): |
PS C:\relax\vcpkg> .\vcpkg.exe list | |
curl:x64-windows 7.68.0-3 A library for transferring data with URLs | |
curl[non-http]:x64-windows Enables protocols beyond HTTP/HTTPS/HTTP2 | |
curl[openssl]:x64-windows SSL support (OpenSSL) | |
curl[ssl]:x64-windows Default SSL backend | |
curl[sspi]:x64-windows SSPI support | |
curl[tool]:x64-windows Builds curl executable | |
curl[winssl]:x64-windows SSL support (Secure Channel / "WinSSL") | |
icu:x64-windows 65.1-4 Mature and widely used Unicode and localization ... | |
openssl-windows:x64-windows 1.1.1d-2 OpenSSL is an open source project that provides ... |
- Unscrew the case via the 4 screws on the back.
- Desolder the positive lead of the rechargeable battery. This is necessary because the bootloader of U4 is only present immediately after power-on.
- Configure Tigard (or other USB-TTL device) as follows:
- VTGT switch to 3V3
- TX to P1 (left side of U4, clearly marked
- RX to P2 (just above P1)
- GND to GND (just below P1, unmarked)
- Prep VTGT to connect to VTGT (just above P2, unmarked, trace goes to pin 2 of U4)