#hardware #roadmap
Preparing for an RTL Design Interview: An Exhaustive List of Topics.
https://thedatabus.io/interview_list
Preparing for an RTL Design Interview: An Exhaustive List of Topics.
https://thedatabus.io/interview_list
thedatabus.in
Preparing for an RTL Design Interview: An Exhaustive List of Topics - theDataBus.io is now theDataBus.in
This is the only resource you need to refer to in order to feel confident about your next RTL design interview.
@p_articles is on again, had to delete due to account problems, no content lost, also check @p_pdfs for some good ebooks
❤2
#comp_arch
When dealing with control hazards, we need to predict the next instructions and flush the pipeline registers if the branch is taken. Since the branch checks whether rs = rt, we can put an equality comparator in the Decode stage, thus reducing the penalty of a misprediction. The interesting thing is that by doing that, we need to deal with RAW (read after write) hazards, because of the equality comparator sources, the process is similar to the post above. If the sources are in the Writeback stage, there is no hazard (the write step is made at low clock, and the read step is made at high clock). If the sources are in the Memory stage, we use a simple logic as the picture shows (ForwardAD and ForwardBD), take a look at the combinatory logic, i will not explain. Now, if the sources are in the Execute stage or in the Memory stage of a lw instruction, the Decode stage will be stalled and the Execute stage will be flushed.
When dealing with control hazards, we need to predict the next instructions and flush the pipeline registers if the branch is taken. Since the branch checks whether rs = rt, we can put an equality comparator in the Decode stage, thus reducing the penalty of a misprediction. The interesting thing is that by doing that, we need to deal with RAW (read after write) hazards, because of the equality comparator sources, the process is similar to the post above. If the sources are in the Writeback stage, there is no hazard (the write step is made at low clock, and the read step is made at high clock). If the sources are in the Memory stage, we use a simple logic as the picture shows (ForwardAD and ForwardBD), take a look at the combinatory logic, i will not explain. Now, if the sources are in the Execute stage or in the Memory stage of a lw instruction, the Decode stage will be stalled and the Execute stage will be flushed.
A little thing to notice, when PcSrcD = 1, the decode pipeline register is flushed (as shown in the first picture).
#hacking
Low Level Attacks, Firmware, BIOS, UEFI
https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/bios_uefi.md
Low Level Attacks, Firmware, BIOS, UEFI
https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/bios_uefi.md
GitHub
Infosec_Reference/Draft/bios_uefi.md at master · rmusser01/Infosec_Reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version. - rmusser01/Infosec_Reference
Media is too big
VIEW IN TELEGRAM
#embedded #hardware
FreeBSD: FPGA development of RISC-V 32bit CPU, and buffer overflow demo
source(@BSDJedi) youtube link
https://t.iss.one/FreeBSD/117
FreeBSD: FPGA development of RISC-V 32bit CPU, and buffer overflow demo
source(@BSDJedi) youtube link
https://t.iss.one/FreeBSD/117
Topics: Y Combinator, Lambda Calculus. #programming
https://dreamsongs.com/Files/WhyOfY.pdf
https://mvanier.livejournal.com/2897.html
https://dreamsongs.com/Files/WhyOfY.pdf
https://mvanier.livejournal.com/2897.html
Topics: Linux Configuration, Hardening. #linux
Configuration recommendations of a Gnu/Linux system
- General principles of security and hardening
- Hardware and firmware configuration
- Securing the boot chain
- Configuring system services
- Kernel configuration
- Privilege and access management
- Isolation
https://cyber.gouv.fr/sites/default/files/document/linux_configuration-en-v2.pdf
https://cyber.gouv.fr/publications/configuration-recommendations-gnulinux-system
Configuration recommendations of a Gnu/Linux system
- General principles of security and hardening
- Hardware and firmware configuration
- Securing the boot chain
- Configuring system services
- Kernel configuration
- Privilege and access management
- Isolation
https://cyber.gouv.fr/sites/default/files/document/linux_configuration-en-v2.pdf
https://cyber.gouv.fr/publications/configuration-recommendations-gnulinux-system
❤1