cinera_handmade.network/miotatsu/riscy/coad/coad019.hmml

204 lines
12 KiB
Plaintext
Raw Permalink Normal View History

2018-10-05 17:22:00 +00:00
[video member=miotatsu stream_platform=twitch project=book title="2.5" vod_platform=youtube id=dcSLXDB766U annotator=Miblo]
[0:08][Set the stage for our continuation of the book]
[1:00][Chapter 2.5 Representing instructions in the Computer[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
[1:58][Chapter 2.5 Example 1 - Translating a RISC-V Assembly Instruction into a Machine Instruction[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
[3:11][The decimal representation of RISC-V :asm `add x9, x20, x21`][:blackboard :isa]
[5:29][Chapter 2.5 Example 1 continued[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
[7:34][RISC-V Instruction Encoding][:blackboard :isa]
[10:03][The binary representation of RISC-V :asm `add x9, x20, x21`][:blackboard :isa]
[13:05][Chapter 2.5 continued, on the instruction format[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
[13:32][A few words on RISC-V's compressed extension][:isa :speech]
[17:20][Chapter 2.5 continued, machine language and machine code[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
[17:30][Distinguishing between assembly and machine code][:isa :language :speech]
[19:50][Chapter 2.5 continued, hexadecimal-to-binary conversion[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
[21:47][Hexadecimal][:blackboard :"numeral system"]
[29:12][@croepha][Hello]
[29:15][Binary to hexadecimal][:blackboard :"numeral system"]
[34:40][@croepha][Unrelated: I am of the opinion that humans should have adopted the dozenal (base 12) system instead of base 10][:"numeral system"]
[36:02][Hexadecimal to decimal conversion][:blackboard :"numeral system"]
[37:22][@croepha][Yeah you can count to 12 on one hand using knuckles and your thumb to point][:"numeral system"]
[39:47][Figure 2.4 - The hexadecimalbinary conversion table[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:"numeral system"]
[42:09][Chapter 2.5 continued, subscripting the :"numeral system"[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]]
[43:46][Chapter 2.5 Example 2 - Binary to Hexadecimal and Back[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:"numeral system"]
[44:52][Converting 0xECA86420 to binary][:blackboard :"numeral system"]
[47:46][@croepha][Later, take care]
[47:54][Converting 0001 0011 0101 0111 1001 1011 1101 1111 to hexadecimal][:blackboard :"numeral system"]
[51:34][Compare our answer to Chapter 2.5 Example 2 with the book[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:"numeral system"]
[53:33][Recommend memorising hexadecimalbinary pairings][:"numeral system" :speech]
[55:55][Chapter 2.5 continued, RISC-V Fields[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
[58:38][Note that the J-type instructions may no longer exist][:isa :speech]
[1:00:35][Chapter 2.5 continued, instruction formats[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
[1:05:14][Design Principle 3: "Good design demands compromises"][:performance :speech]
[1:08:58][Design Principle 2: "Smaller is faster"][:performance :speech]
[1:14:42][Design Principle 1: "Simplicity favours regularity"][:performance :speech]
[1:16:30][Shout-out to RAD Game Tools' employee @Mr4thDimention and the quality of his editor ~4coder][:speech]
[1:20:20][Chapter 2.5 continued, the compromises chosen by the RISC-V designers[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
[1:24:14][The load register instruction from page 71[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4][ref
site="Book Club / Computer Organization and Design: 2.3 cont."
page="Chapter 2.3 Example 3 - Compiling Using Load and Store"
url=https://riscy.handmade.network/episode/coad/coad016/#2690]][:isa]
[1:28:56][Figure 2.5 - RISC-V instruction encoding[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
[1:32:46][Point out the versatility of the opcodes in RISC-V][:isa :speech]
[1:34:57][Figure 2.5 continued[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
[1:36:23][A few more words on the versatility and unsimplicity of opcodes][:isa :speech]
[1:38:22][Chapter 2.5 Example 3 - Translating RISC-V Assembly :Language into Machine Language[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm]
[1:39:22][Lowering from C to assembly: `A\[30\] = h + A\[30\] + 1;`[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4][ref
title="RISC-V Reader"
author="David Patterson and Andrew Waterman"
publisher="Strawberry Canyon"
isbn=9780999249116
url=http://www.riscvbook.com/]][:asm :blackboard :language]
[1:50:45][Translating our assembly to machine code[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4][ref
title="RISC-V Reader"
author="David Patterson and Andrew Waterman"
publisher="Strawberry Canyon"
isbn=9780999249116
url=http://www.riscvbook.com/]][:asm :blackboard :isa :language]
[2:23:25][Thoughts on viewing RISC-V instructions][:isa :language :speech]
[2:31:48][Continue translating our assembly to machine code[ref
title="RISC-V Reader"
author="David Patterson and Andrew Waterman"
publisher="Strawberry Canyon"
isbn=9780999249116
url=http://www.riscvbook.com/]][:asm :blackboard :isa :language]
[2:44:17][Compare our answer to Chapter 2.5 Example 3 with the book[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language]
[3:09:26][A few words on the greater potential for errors in handwritten machine code than C]
[3:14:01][Chapter 2.5 Elaborations, on immediate instructions[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language]
[3:15:11][Chapter 2.5 Hardware / Software Interface[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language]
[3:15:40][Figure 2.6 - RISC-V architecture revealed through Section 2.5[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language]
[3:18:30][Chapter 2.5 The Big Picture[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language]
[3:19:58][Figure 2.7 The stored-program concept[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language :memory]
[3:21:24][Chapter 2.5 Check Yourself[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language]
[3:24:41][That ends section 2.5][:speech]
[/video]