Annotate riscy/coad019
This commit is contained in:
parent
9ba566c010
commit
b1624a3971
|
@ -0,0 +1,203 @@
|
||||||
|
[video member=miotatsu stream_platform=twitch project=book title="2.5" vod_platform=youtube id=dcSLXDB766U annotator=Miblo]
|
||||||
|
[0:08][Set the stage for our continuation of the book]
|
||||||
|
[1:00][Chapter 2.5 Representing instructions in the Computer[ref
|
||||||
|
title="Computer Organization and Design RISC-V Edition"
|
||||||
|
author="David Patterson & John Hennessy"
|
||||||
|
publisher="Morgan Kaufmann"
|
||||||
|
isbn=9780128122754
|
||||||
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
|
||||||
|
[1:58][Chapter 2.5 Example 1 - Translating a RISC-V Assembly Instruction into a Machine Instruction[ref
|
||||||
|
title="Computer Organization and Design RISC-V Edition"
|
||||||
|
author="David Patterson & John Hennessy"
|
||||||
|
publisher="Morgan Kaufmann"
|
||||||
|
isbn=9780128122754
|
||||||
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
|
||||||
|
[3:11][The decimal representation of RISC-V :asm `add x9, x20, x21`][:blackboard :isa]
|
||||||
|
[5:29][Chapter 2.5 Example 1 continued[ref
|
||||||
|
title="Computer Organization and Design RISC-V Edition"
|
||||||
|
author="David Patterson & John Hennessy"
|
||||||
|
publisher="Morgan Kaufmann"
|
||||||
|
isbn=9780128122754
|
||||||
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
|
||||||
|
[7:34][RISC-V Instruction Encoding][:blackboard :isa]
|
||||||
|
[10:03][The binary representation of RISC-V :asm `add x9, x20, x21`][:blackboard :isa]
|
||||||
|
[13:05][Chapter 2.5 continued, on the instruction format[ref
|
||||||
|
title="Computer Organization and Design RISC-V Edition"
|
||||||
|
author="David Patterson & John Hennessy"
|
||||||
|
publisher="Morgan Kaufmann"
|
||||||
|
isbn=9780128122754
|
||||||
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
|
||||||
|
[13:32][A few words on RISC-V's compressed extension][:isa :speech]
|
||||||
|
[17:20][Chapter 2.5 continued, machine language and machine code[ref
|
||||||
|
title="Computer Organization and Design RISC-V Edition"
|
||||||
|
author="David Patterson & John Hennessy"
|
||||||
|
publisher="Morgan Kaufmann"
|
||||||
|
isbn=9780128122754
|
||||||
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
|
||||||
|
[17:30][Distinguishing between assembly and machine code][:isa :language :speech]
|
||||||
|
[19:50][Chapter 2.5 continued, hexadecimal-to-binary conversion[ref
|
||||||
|
title="Computer Organization and Design RISC-V Edition"
|
||||||
|
author="David Patterson & John Hennessy"
|
||||||
|
publisher="Morgan Kaufmann"
|
||||||
|
isbn=9780128122754
|
||||||
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
|
||||||
|
[21:47][Hexadecimal][:blackboard :"numeral system"]
|
||||||
|
[29:12][@croepha][Hello]
|
||||||
|
[29:15][Binary to hexadecimal][:blackboard :"numeral system"]
|
||||||
|
[34:40][@croepha][Unrelated: I am of the opinion that humans should have adopted the dozenal (base 12) system instead of base 10][:"numeral system"]
|
||||||
|
[36:02][Hexadecimal to decimal conversion][:blackboard :"numeral system"]
|
||||||
|
[37:22][@croepha][Yeah you can count to 12 on one hand using knuckles and your thumb to point][:"numeral system"]
|
||||||
|
[39:47][Figure 2.4 - The hexadecimal–binary conversion table[ref
|
||||||
|
title="Computer Organization and Design RISC-V Edition"
|
||||||
|
author="David Patterson & John Hennessy"
|
||||||
|
publisher="Morgan Kaufmann"
|
||||||
|
isbn=9780128122754
|
||||||
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:"numeral system"]
|
||||||
|
[42:09][Chapter 2.5 continued, subscripting the :"numeral system"[ref
|
||||||
|
title="Computer Organization and Design RISC-V Edition"
|
||||||
|
author="David Patterson & John Hennessy"
|
||||||
|
publisher="Morgan Kaufmann"
|
||||||
|
isbn=9780128122754
|
||||||
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]]
|
||||||
|
[43:46][Chapter 2.5 Example 2 - Binary to Hexadecimal and Back[ref
|
||||||
|
title="Computer Organization and Design RISC-V Edition"
|
||||||
|
author="David Patterson & John Hennessy"
|
||||||
|
publisher="Morgan Kaufmann"
|
||||||
|
isbn=9780128122754
|
||||||
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:"numeral system"]
|
||||||
|
[44:52][Converting 0xECA86420 to binary][:blackboard :"numeral system"]
|
||||||
|
[47:46][@croepha][Later, take care]
|
||||||
|
[47:54][Converting 0001 0011 0101 0111 1001 1011 1101 1111 to hexadecimal][:blackboard :"numeral system"]
|
||||||
|
[51:34][Compare our answer to Chapter 2.5 Example 2 with the book[ref
|
||||||
|
title="Computer Organization and Design RISC-V Edition"
|
||||||
|
author="David Patterson & John Hennessy"
|
||||||
|
publisher="Morgan Kaufmann"
|
||||||
|
isbn=9780128122754
|
||||||
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:"numeral system"]
|
||||||
|
[53:33][Recommend memorising hexadecimal–binary pairings][:"numeral system" :speech]
|
||||||
|
[55:55][Chapter 2.5 continued, RISC-V Fields[ref
|
||||||
|
title="Computer Organization and Design RISC-V Edition"
|
||||||
|
author="David Patterson & John Hennessy"
|
||||||
|
publisher="Morgan Kaufmann"
|
||||||
|
isbn=9780128122754
|
||||||
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
|
||||||
|
[58:38][Note that the J-type instructions may no longer exist][:isa :speech]
|
||||||
|
[1:00:35][Chapter 2.5 continued, instruction formats[ref
|
||||||
|
title="Computer Organization and Design RISC-V Edition"
|
||||||
|
author="David Patterson & John Hennessy"
|
||||||
|
publisher="Morgan Kaufmann"
|
||||||
|
isbn=9780128122754
|
||||||
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
|
||||||
|
[1:05:14][Design Principle 3: "Good design demands compromises"][:performance :speech]
|
||||||
|
[1:08:58][Design Principle 2: "Smaller is faster"][:performance :speech]
|
||||||
|
[1:14:42][Design Principle 1: "Simplicity favours regularity"][:performance :speech]
|
||||||
|
[1:16:30][Shout-out to RAD Game Tools' employee @Mr4thDimention and the quality of his editor ~4coder][:speech]
|
||||||
|
[1:20:20][Chapter 2.5 continued, the compromises chosen by the RISC-V designers[ref
|
||||||
|
title="Computer Organization and Design RISC-V Edition"
|
||||||
|
author="David Patterson & John Hennessy"
|
||||||
|
publisher="Morgan Kaufmann"
|
||||||
|
isbn=9780128122754
|
||||||
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
|
||||||
|
[1:24:14][The load register instruction from page 71[ref
|
||||||
|
title="Computer Organization and Design RISC-V Edition"
|
||||||
|
author="David Patterson & John Hennessy"
|
||||||
|
publisher="Morgan Kaufmann"
|
||||||
|
isbn=9780128122754
|
||||||
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4][ref
|
||||||
|
site="Book Club / Computer Organization and Design: 2.3 cont."
|
||||||
|
page="Chapter 2.3 Example 3 - Compiling Using Load and Store"
|
||||||
|
url=https://riscy.handmade.network/episode/coad/coad016/#2690]][:isa]
|
||||||
|
[1:28:56][Figure 2.5 - RISC-V instruction encoding[ref
|
||||||
|
title="Computer Organization and Design RISC-V Edition"
|
||||||
|
author="David Patterson & John Hennessy"
|
||||||
|
publisher="Morgan Kaufmann"
|
||||||
|
isbn=9780128122754
|
||||||
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
|
||||||
|
[1:32:46][Point out the versatility of the opcodes in RISC-V][:isa :speech]
|
||||||
|
[1:34:57][Figure 2.5 continued[ref
|
||||||
|
title="Computer Organization and Design RISC-V Edition"
|
||||||
|
author="David Patterson & John Hennessy"
|
||||||
|
publisher="Morgan Kaufmann"
|
||||||
|
isbn=9780128122754
|
||||||
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
|
||||||
|
[1:36:23][A few more words on the versatility and unsimplicity of opcodes][:isa :speech]
|
||||||
|
[1:38:22][Chapter 2.5 Example 3 - Translating RISC-V Assembly :Language into Machine Language[ref
|
||||||
|
title="Computer Organization and Design RISC-V Edition"
|
||||||
|
author="David Patterson & John Hennessy"
|
||||||
|
publisher="Morgan Kaufmann"
|
||||||
|
isbn=9780128122754
|
||||||
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm]
|
||||||
|
[1:39:22][Lowering from C to assembly: `A\[30\] = h + A\[30\] + 1;`[ref
|
||||||
|
title="Computer Organization and Design RISC-V Edition"
|
||||||
|
author="David Patterson & John Hennessy"
|
||||||
|
publisher="Morgan Kaufmann"
|
||||||
|
isbn=9780128122754
|
||||||
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4][ref
|
||||||
|
title="RISC-V Reader"
|
||||||
|
author="David Patterson and Andrew Waterman"
|
||||||
|
publisher="Strawberry Canyon"
|
||||||
|
isbn=9780999249116
|
||||||
|
url=http://www.riscvbook.com/]][:asm :blackboard :language]
|
||||||
|
[1:50:45][Translating our assembly to machine code[ref
|
||||||
|
title="Computer Organization and Design RISC-V Edition"
|
||||||
|
author="David Patterson & John Hennessy"
|
||||||
|
publisher="Morgan Kaufmann"
|
||||||
|
isbn=9780128122754
|
||||||
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4][ref
|
||||||
|
title="RISC-V Reader"
|
||||||
|
author="David Patterson and Andrew Waterman"
|
||||||
|
publisher="Strawberry Canyon"
|
||||||
|
isbn=9780999249116
|
||||||
|
url=http://www.riscvbook.com/]][:asm :blackboard :isa :language]
|
||||||
|
[2:23:25][Thoughts on viewing RISC-V instructions][:isa :language :speech]
|
||||||
|
[2:31:48][Continue translating our assembly to machine code[ref
|
||||||
|
title="RISC-V Reader"
|
||||||
|
author="David Patterson and Andrew Waterman"
|
||||||
|
publisher="Strawberry Canyon"
|
||||||
|
isbn=9780999249116
|
||||||
|
url=http://www.riscvbook.com/]][:asm :blackboard :isa :language]
|
||||||
|
[2:44:17][Compare our answer to Chapter 2.5 Example 3 with the book[ref
|
||||||
|
title="Computer Organization and Design RISC-V Edition"
|
||||||
|
author="David Patterson & John Hennessy"
|
||||||
|
publisher="Morgan Kaufmann"
|
||||||
|
isbn=9780128122754
|
||||||
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language]
|
||||||
|
[3:09:26][A few words on the greater potential for errors in handwritten machine code than C]
|
||||||
|
[3:14:01][Chapter 2.5 Elaborations, on immediate instructions[ref
|
||||||
|
title="Computer Organization and Design RISC-V Edition"
|
||||||
|
author="David Patterson & John Hennessy"
|
||||||
|
publisher="Morgan Kaufmann"
|
||||||
|
isbn=9780128122754
|
||||||
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language]
|
||||||
|
[3:15:11][Chapter 2.5 Hardware / Software Interface[ref
|
||||||
|
title="Computer Organization and Design RISC-V Edition"
|
||||||
|
author="David Patterson & John Hennessy"
|
||||||
|
publisher="Morgan Kaufmann"
|
||||||
|
isbn=9780128122754
|
||||||
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language]
|
||||||
|
[3:15:40][Figure 2.6 - RISC-V architecture revealed through Section 2.5[ref
|
||||||
|
title="Computer Organization and Design RISC-V Edition"
|
||||||
|
author="David Patterson & John Hennessy"
|
||||||
|
publisher="Morgan Kaufmann"
|
||||||
|
isbn=9780128122754
|
||||||
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language]
|
||||||
|
[3:18:30][Chapter 2.5 The Big Picture[ref
|
||||||
|
title="Computer Organization and Design RISC-V Edition"
|
||||||
|
author="David Patterson & John Hennessy"
|
||||||
|
publisher="Morgan Kaufmann"
|
||||||
|
isbn=9780128122754
|
||||||
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language]
|
||||||
|
[3:19:58][Figure 2.7 The stored-program concept[ref
|
||||||
|
title="Computer Organization and Design RISC-V Edition"
|
||||||
|
author="David Patterson & John Hennessy"
|
||||||
|
publisher="Morgan Kaufmann"
|
||||||
|
isbn=9780128122754
|
||||||
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language :memory]
|
||||||
|
[3:21:24][Chapter 2.5 Check Yourself[ref
|
||||||
|
title="Computer Organization and Design RISC-V Edition"
|
||||||
|
author="David Patterson & John Hennessy"
|
||||||
|
publisher="Morgan Kaufmann"
|
||||||
|
isbn=9780128122754
|
||||||
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language]
|
||||||
|
[3:24:41][That ends section 2.5][:speech]
|
||||||
|
[/video]
|
|
@ -0,0 +1,2 @@
|
||||||
|
[video member=miotatsu stream_platform=twitch project=riscy title="RISC-V PC Planning" vod_platform=youtube id=nKfandgaA6Q annotator=]
|
||||||
|
[/video]
|
Loading…
Reference in New Issue