Summary of the learning contents of the textbook fourth Chapter processor Architecture Y86-64 instruction set architectureThe "programmer" here refers to the person who writes the program with the assembler code, or the compiler that produces the machine code . The state of y86-64 is similar to x86-64.Y86-64 directive
X86-64 's MOVQ instruction is divided into 4 different instructions: IRMOVQ,RRMOVQ,MRMOVQ,RMMOVQ, which explicitly indicates the source and destination format, and the source
, delete the node and set the parent's child reference to null. The color of brothers is the most important thing to delete.
Problems and Solutions in teaching material Learning
Problem 1: In the deletion of the red/black tree, an iteration termination condition is (current. Color = red), which cannot be understood.
Problem 1: because the number of black nodes in each path is the same, when the current node is red, the iteration conditions are met until the current node is red, and al
selection: determine where the desired word starts in the block.
Associated High-speed cache:1. group selection in group-connected high-speed cache: Same as group selection in direct ing high-speed cache, group index bit Identification Group.2. Row matching and word selection in the group-connected high-speed cache: each group is considered as a small memory associated with a (Key, value) pair array,3. Input key to return the value in the corresponding array. The cache must search for each row
layer and find it in the cache content at the K layer. You can directly read data at the K layer, which is called cache hit.
Cache miss. No data is found at the K layer. The cache at the K layer needs to retrieve the block containing objects from the cache at the K + 1 layer. If the K layer is full, overwrite an existing block. Cool hit, the K layer has nothing, so it does not hit.
High-speed cache memory, mainly the size (p426) and probability (p431)Summary of test errors last week
2018-
Source: POJ 2019 Cornfields
Question: the difference between the maximum and minimum values of a square two-dimensional Interval
Idea: Just use the two-dimensional ST trial template.
#include
#include #include
using namespace std;const int maxn = 255;int dp[maxn][maxn][8][8];int dp2[maxn][maxn][8][8];int a[maxn][maxn];int n, m;void RMQ_init(int n){for(int i = 1; i
n)ll = n;if(rr > n)rr = n;printf("%d\n", RMQ(l, r, ll, rr));}return
POJ 2019 Cornfields (RMQ? I am violent)
[Description]: The question tells us a lot of data. N indicates the farm size N * N and B. B indicates the size of the small square we want to measure B * B, K also indicates that we want to test several groups of data on this N * N farm. The coordinates of the upper left corner of the small square to be measured are given to you, x and y. Now let's find the maximum value in the small square of B * B minus the
shift x>>k: Move the K-bit right and the value at the left to complement K's most significant bit
Logical right Shift x>>>k: Move K-bit right, left complement K 0
Use arithmetic right shift for signed number, logical right shift for unsigned numberInteger representation
Information = bit + context
unsigned integer: b2u4[0011]=0 2^3+0 2^2+1 2^1+1 2^0=3
Signed integer-complement code: B2t4[1011]=-1 2^3+0 2^2+1 2^1+1 2^0=-5
Unsigned number means you need to append the suf
Question: When using setup, you will be prompted to be unable to access or have no appropriate rights.A: The initial estimate is a "setup" Bug and now provides the processSome people say it's a privilege problem, let's look at:Cmd:control USERPASSWORDS2I'm using administrator, but I can't use "setup."We can do this:C:\Windows\System32Shortcut to DesktopDirectly open the "Control Panel" instead of the bug "Setup", I initially estimate is a bugWindows Server 2
Title Description: Again to the harvest season, coincides with the small easy to go to cattle and cows in the orchard to play. New often said he knew every place in the orchard, small easy to believe, so he wanted to test cattle and cattle. There are n stacks of apples in the orchard, and the number of apples per heap is AI, and it is easy to know which stacks of x apples are left to right. Niuniu thought this was a big problem, so I hope you did, he answered. Input Description: First row one nu
Read
MDN positioning
Positioning allows you to remove elements from a normal document flow layout and make them behave differently
Static positioning is the default behavior!position: static;
position:relative;
position: absolute;
MDN Positioning Combat
MDN Flexbox
Learn CSS Layouts
CSS layout (three) layout model
CSS Layout (iv) Float
CSS Layout (v) How the page is laid out
CSS layout (vi) alignment
enable the compiled executable document to be debugged with GDB
New exploit.c, code below, \x?? \x?? \x?? \x?? Need to add shellcode to the address stored in memory because the location can overwrite the return address just after an overflow occurs.
We want to get shellcode in-memory address, enter commands gdb stack anddisass main
According to strcpy(buffer + 100,shellcode) the statement, we calculate shellcode the address as0xffffd350(十六进制) + 0x64(100的十六进制) = 0xffffd3b4(十六进制)
Mo
1. Machine-Level Code(1) Two kinds of abstract
Defines the format and behavior of machine-level programs by ISA
The memory address used by the machine-level program is the virtual address
2. Data format3. Operand designator4. Press in and eject stack data
Follow the principle of first in and out
Push Press in, pop delete
Pushq press four words into the stack popq four words pop-up stack
5. Arithmetic and logical operations
LEAQ Load Valid address
INC plus a
D
non-gate or non-gate
HCL integer Expression
Case Expression Format:
[ select 1: expr 1 select 2: expr 2 . select k: expr k ]
Set Relationship:iexp in{ iexp1,iexp2,...iexpk }
Arithmetic/logic unit (ALU)
Sequential implementation of Y86-64
Organize the processing into stages
Value fetch--> decoding decode--> performing execute--> memory--> writeback write back write back--> update PC update
SEQ
week's exam error summary 1.The following jump commands are related to ZF ()A. jmpB. JeC. jsD. JaE. JBF. JbeAnalytical:2.Assuming that the function of the C-expression T=a+b is completed with the add instruction, the correct statement about the condition Code Register is ()A. If t==0, then zf=1B. If tC. If tD. if (aE. if (aF. LEAQ directive does not affect the condition code registerG. CMP directives do not affect the condition code registerAnalysis: Textbook p135ZF: 0 logo. The result of the r
I. Learning Objectives
Understanding the role of ISA abstraction
Master Isa, and be able to learn other architecture extrapolate
Understanding the pipeline and how it is implemented
Second, the Learning content y86-64 directive
MOVQ directive IRMOVQ rrmovq mrmovq RMMOVQ
Four integer manipulation instructions Addq,subq,andq,xorq only the Register data
7 Jump Instructions Cmovle cmovl cmove cmovne cmovge CMOVG
The call command returns the address to the stack, and then j
1.Y86-64 Instruction Set architecture①Y86-64 directive
MOVQ directive IRMOVQ rrmovq mrmovq RMMOVQ
Four integer manipulation instructions Addq,subq,andq,xorq only the Register data
7 Jump Instructions Cmovle cmovl cmove cmovne cmovge CMOVG
The call command returns the address to the stack, and then jumps to the destination address, and the RET instruction returns from such calls
Pushq and POPQ instructions are implemented into the stack and out of the stack
Execution of Halt
scoring criteria, I scored for Tan Xin's blog: 6 points. The score is as follows:
Question plus 3 points
Sentiment does not impracticality plus 1 points
Beautifully formatted plus 1 points-Correct use of markdown syntax plus 1 points-Complete elements in the template plus 1 points
Based on the scoring criteria, I scored for Wang Yuhan's blog: 6 points. The score is as follows:
Beautifully formatted plus 1 points
Question plus 2 points
Sent
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.