cinera_handmade.network/miotatsu/riscy/coad/coad019.hmml

204 lines
12 KiB
Plaintext
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[video member=miotatsu stream_platform=twitch project=book title="2.5" vod_platform=youtube id=dcSLXDB766U annotator=Miblo]
[0:08][Set the stage for our continuation of the book]
[1:00][Chapter 2.5 Representing instructions in the Computer[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
[1:58][Chapter 2.5 Example 1 - Translating a RISC-V Assembly Instruction into a Machine Instruction[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
[3:11][The decimal representation of RISC-V :asm `add x9, x20, x21`][:blackboard :isa]
[5:29][Chapter 2.5 Example 1 continued[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
[7:34][RISC-V Instruction Encoding][:blackboard :isa]
[10:03][The binary representation of RISC-V :asm `add x9, x20, x21`][:blackboard :isa]
[13:05][Chapter 2.5 continued, on the instruction format[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
[13:32][A few words on RISC-V's compressed extension][:isa :speech]
[17:20][Chapter 2.5 continued, machine language and machine code[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
[17:30][Distinguishing between assembly and machine code][:isa :language :speech]
[19:50][Chapter 2.5 continued, hexadecimal-to-binary conversion[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
[21:47][Hexadecimal][:blackboard :"numeral system"]
[29:12][@croepha][Hello]
[29:15][Binary to hexadecimal][:blackboard :"numeral system"]
[34:40][@croepha][Unrelated: I am of the opinion that humans should have adopted the dozenal (base 12) system instead of base 10][:"numeral system"]
[36:02][Hexadecimal to decimal conversion][:blackboard :"numeral system"]
[37:22][@croepha][Yeah you can count to 12 on one hand using knuckles and your thumb to point][:"numeral system"]
[39:47][Figure 2.4 - The hexadecimalbinary conversion table[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:"numeral system"]
[42:09][Chapter 2.5 continued, subscripting the :"numeral system"[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]]
[43:46][Chapter 2.5 Example 2 - Binary to Hexadecimal and Back[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:"numeral system"]
[44:52][Converting 0xECA86420 to binary][:blackboard :"numeral system"]
[47:46][@croepha][Later, take care]
[47:54][Converting 0001 0011 0101 0111 1001 1011 1101 1111 to hexadecimal][:blackboard :"numeral system"]
[51:34][Compare our answer to Chapter 2.5 Example 2 with the book[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:"numeral system"]
[53:33][Recommend memorising hexadecimalbinary pairings][:"numeral system" :speech]
[55:55][Chapter 2.5 continued, RISC-V Fields[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
[58:38][Note that the J-type instructions may no longer exist][:isa :speech]
[1:00:35][Chapter 2.5 continued, instruction formats[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
[1:05:14][Design Principle 3: "Good design demands compromises"][:performance :speech]
[1:08:58][Design Principle 2: "Smaller is faster"][:performance :speech]
[1:14:42][Design Principle 1: "Simplicity favours regularity"][:performance :speech]
[1:16:30][Shout-out to RAD Game Tools' employee @Mr4thDimention and the quality of his editor ~4coder][:speech]
[1:20:20][Chapter 2.5 continued, the compromises chosen by the RISC-V designers[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
[1:24:14][The load register instruction from page 71[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4][ref
site="Book Club / Computer Organization and Design: 2.3 cont."
page="Chapter 2.3 Example 3 - Compiling Using Load and Store"
url=https://riscy.handmade.network/episode/coad/coad016/#2690]][:isa]
[1:28:56][Figure 2.5 - RISC-V instruction encoding[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
[1:32:46][Point out the versatility of the opcodes in RISC-V][:isa :speech]
[1:34:57][Figure 2.5 continued[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:isa]
[1:36:23][A few more words on the versatility and unsimplicity of opcodes][:isa :speech]
[1:38:22][Chapter 2.5 Example 3 - Translating RISC-V Assembly :Language into Machine Language[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm]
[1:39:22][Lowering from C to assembly: `A\[30\] = h + A\[30\] + 1;`[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4][ref
title="RISC-V Reader"
author="David Patterson and Andrew Waterman"
publisher="Strawberry Canyon"
isbn=9780999249116
url=http://www.riscvbook.com/]][:asm :blackboard :language]
[1:50:45][Translating our assembly to machine code[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4][ref
title="RISC-V Reader"
author="David Patterson and Andrew Waterman"
publisher="Strawberry Canyon"
isbn=9780999249116
url=http://www.riscvbook.com/]][:asm :blackboard :isa :language]
[2:23:25][Thoughts on viewing RISC-V instructions][:isa :language :speech]
[2:31:48][Continue translating our assembly to machine code[ref
title="RISC-V Reader"
author="David Patterson and Andrew Waterman"
publisher="Strawberry Canyon"
isbn=9780999249116
url=http://www.riscvbook.com/]][:asm :blackboard :isa :language]
[2:44:17][Compare our answer to Chapter 2.5 Example 3 with the book[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language]
[3:09:26][A few words on the greater potential for errors in handwritten machine code than C]
[3:14:01][Chapter 2.5 Elaborations, on immediate instructions[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language]
[3:15:11][Chapter 2.5 Hardware / Software Interface[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language]
[3:15:40][Figure 2.6 - RISC-V architecture revealed through Section 2.5[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language]
[3:18:30][Chapter 2.5 The Big Picture[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language]
[3:19:58][Figure 2.7 The stored-program concept[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language :memory]
[3:21:24][Chapter 2.5 Check Yourself[ref
title="Computer Organization and Design RISC-V Edition"
author="David Patterson & John Hennessy"
publisher="Morgan Kaufmann"
isbn=9780128122754
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:asm :isa :language]
[3:24:41][That ends section 2.5][:speech]
[/video]