[video member=miotatsu stream_platform=twitch project=book title="2.5" vod_platform=youtube id=dcSLXDB766U annotator=Miblo] [0:08][Set the stage for our continuation of the book] [1:00][Chapter 2.5 Representing instructions in the Computer[ref title="Computer Organization and Design RISC-V Edition" author="David Patterson & John Hennessy" publisher="Morgan Kaufmann" isbn=9780128122754 url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa] [1:58][Chapter 2.5 Example 1 - Translating a RISC-V Assembly Instruction into a Machine Instruction[ref title="Computer Organization and Design RISC-V Edition" author="David Patterson & John Hennessy" publisher="Morgan Kaufmann" isbn=9780128122754 url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa] [3:11][The decimal representation of RISC-V :asm `add x9, x20, x21`][:blackboard :isa] [5:29][Chapter 2.5 Example 1 continued[ref title="Computer Organization and Design RISC-V Edition" author="David Patterson & John Hennessy" publisher="Morgan Kaufmann" isbn=9780128122754 url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa] [7:34][RISC-V Instruction Encoding][:blackboard :isa] [10:03][The binary representation of RISC-V :asm `add x9, x20, x21`][:blackboard :isa] [13:05][Chapter 2.5 continued, on the instruction format[ref title="Computer Organization and Design RISC-V Edition" author="David Patterson & John Hennessy" publisher="Morgan Kaufmann" isbn=9780128122754 url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa] [13:32][A few words on RISC-V's compressed extension][:isa :speech] [17:20][Chapter 2.5 continued, machine language and machine code[ref title="Computer Organization and Design RISC-V Edition" author="David Patterson & John Hennessy" publisher="Morgan Kaufmann" isbn=9780128122754 url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa] [17:30][Distinguishing between assembly and machine code][:isa :language :speech] [19:50][Chapter 2.5 continued, hexadecimal-to-binary conversion[ref title="Computer Organization and Design RISC-V Edition" author="David Patterson & John Hennessy" publisher="Morgan Kaufmann" isbn=9780128122754 url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa] [21:47][Hexadecimal][:blackboard :"numeral system"] [29:12][@croepha][Hello] [29:15][Binary to hexadecimal][:blackboard :"numeral system"] [34:40][@croepha][Unrelated: I am of the opinion that humans should have adopted the dozenal (base 12) system instead of base 10][:"numeral system"] [36:02][Hexadecimal to decimal conversion][:blackboard :"numeral system"] [37:22][@croepha][Yeah you can count to 12 on one hand using knuckles and your thumb to point][:"numeral system"] [39:47][Figure 2.4 - The hexadecimal–binary conversion table[ref title="Computer Organization and Design RISC-V Edition" author="David Patterson & John Hennessy" publisher="Morgan Kaufmann" isbn=9780128122754 url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:"numeral system"] [42:09][Chapter 2.5 continued, subscripting the :"numeral system"[ref title="Computer Organization and Design RISC-V Edition" author="David Patterson & John Hennessy" publisher="Morgan Kaufmann" isbn=9780128122754 url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]] [43:46][Chapter 2.5 Example 2 - Binary to Hexadecimal and Back[ref title="Computer Organization and Design RISC-V Edition" author="David Patterson & John Hennessy" publisher="Morgan Kaufmann" isbn=9780128122754 url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:"numeral system"] [44:52][Converting 0xECA86420 to binary][:blackboard :"numeral system"] [47:46][@croepha][Later, take care] [47:54][Converting 0001 0011 0101 0111 1001 1011 1101 1111 to hexadecimal][:blackboard :"numeral system"] [51:34][Compare our answer to Chapter 2.5 Example 2 with the book[ref title="Computer Organization and Design RISC-V Edition" author="David Patterson & John Hennessy" publisher="Morgan Kaufmann" isbn=9780128122754 url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:"numeral system"] [53:33][Recommend memorising hexadecimal–binary pairings][:"numeral system" :speech] [55:55][Chapter 2.5 continued, RISC-V Fields[ref title="Computer Organization and Design RISC-V Edition" author="David Patterson & John Hennessy" publisher="Morgan Kaufmann" isbn=9780128122754 url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa] [58:38][Note that the J-type instructions may no longer exist][:isa :speech] [1:00:35][Chapter 2.5 continued, instruction formats[ref title="Computer Organization and Design RISC-V Edition" author="David Patterson & John Hennessy" publisher="Morgan Kaufmann" isbn=9780128122754 url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa] [1:05:14][Design Principle 3: "Good design demands compromises"][:performance :speech] [1:08:58][Design Principle 2: "Smaller is faster"][:performance :speech] [1:14:42][Design Principle 1: "Simplicity favours regularity"][:performance :speech] [1:16:30][Shout-out to RAD Game Tools' employee @Mr4thDimention and the quality of his editor ~4coder][:speech] [1:20:20][Chapter 2.5 continued, the compromises chosen by the RISC-V designers[ref title="Computer Organization and Design RISC-V Edition" author="David Patterson & John Hennessy" publisher="Morgan Kaufmann" isbn=9780128122754 url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa] [1:24:14][The load register instruction from page 71[ref title="Computer Organization and Design RISC-V Edition" author="David Patterson & John Hennessy" publisher="Morgan Kaufmann" isbn=9780128122754 url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4][ref site="Book Club / Computer Organization and Design: 2.3 cont." page="Chapter 2.3 Example 3 - Compiling Using Load and Store" url=https://riscy.handmade.network/episode/coad/coad016/#2690]][:isa] [1:28:56][Figure 2.5 - RISC-V instruction encoding[ref title="Computer Organization and Design RISC-V Edition" author="David Patterson & John Hennessy" publisher="Morgan Kaufmann" isbn=9780128122754 url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa] [1:32:46][Point out the versatility of the opcodes in RISC-V][:isa :speech] [1:34:57][Figure 2.5 continued[ref title="Computer Organization and Design RISC-V Edition" author="David Patterson & John Hennessy" publisher="Morgan Kaufmann" isbn=9780128122754 url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa] [1:36:23][A few more words on the versatility and unsimplicity of opcodes][:isa :speech] [1:38:22][Chapter 2.5 Example 3 - Translating RISC-V Assembly :Language into Machine Language[ref title="Computer Organization and Design RISC-V Edition" author="David Patterson & John Hennessy" publisher="Morgan Kaufmann" isbn=9780128122754 url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm] [1:39:22][Lowering from C to assembly: `A\[30\] = h + A\[30\] + 1;`[ref title="Computer Organization and Design RISC-V Edition" author="David Patterson & John Hennessy" publisher="Morgan Kaufmann" isbn=9780128122754 url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4][ref title="RISC-V Reader" author="David Patterson and Andrew Waterman" publisher="Strawberry Canyon" isbn=9780999249116 url=http://www.riscvbook.com/]][:asm :blackboard :language] [1:50:45][Translating our assembly to machine code[ref title="Computer Organization and Design RISC-V Edition" author="David Patterson & John Hennessy" publisher="Morgan Kaufmann" isbn=9780128122754 url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4][ref title="RISC-V Reader" author="David Patterson and Andrew Waterman" publisher="Strawberry Canyon" isbn=9780999249116 url=http://www.riscvbook.com/]][:asm :blackboard :isa :language] [2:23:25][Thoughts on viewing RISC-V instructions][:isa :language :speech] [2:31:48][Continue translating our assembly to machine code[ref title="RISC-V Reader" author="David Patterson and Andrew Waterman" publisher="Strawberry Canyon" isbn=9780999249116 url=http://www.riscvbook.com/]][:asm :blackboard :isa :language] [2:44:17][Compare our answer to Chapter 2.5 Example 3 with the book[ref title="Computer Organization and Design RISC-V Edition" author="David Patterson & John Hennessy" publisher="Morgan Kaufmann" isbn=9780128122754 url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language] [3:09:26][A few words on the greater potential for errors in handwritten machine code than C] [3:14:01][Chapter 2.5 Elaborations, on immediate instructions[ref title="Computer Organization and Design RISC-V Edition" author="David Patterson & John Hennessy" publisher="Morgan Kaufmann" isbn=9780128122754 url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language] [3:15:11][Chapter 2.5 Hardware / Software Interface[ref title="Computer Organization and Design RISC-V Edition" author="David Patterson & John Hennessy" publisher="Morgan Kaufmann" isbn=9780128122754 url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language] [3:15:40][Figure 2.6 - RISC-V architecture revealed through Section 2.5[ref title="Computer Organization and Design RISC-V Edition" author="David Patterson & John Hennessy" publisher="Morgan Kaufmann" isbn=9780128122754 url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language] [3:18:30][Chapter 2.5 The Big Picture[ref title="Computer Organization and Design RISC-V Edition" author="David Patterson & John Hennessy" publisher="Morgan Kaufmann" isbn=9780128122754 url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language] [3:19:58][Figure 2.7 The stored-program concept[ref title="Computer Organization and Design RISC-V Edition" author="David Patterson & John Hennessy" publisher="Morgan Kaufmann" isbn=9780128122754 url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language :memory] [3:21:24][Chapter 2.5 Check Yourself[ref title="Computer Organization and Design RISC-V Edition" author="David Patterson & John Hennessy" publisher="Morgan Kaufmann" isbn=9780128122754 url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language] [3:24:41][That ends section 2.5][:speech] [/video]