#comp_arch
When dealing with control hazards, we need to predict the next instructions and flush the pipeline registers if the branch is taken. Since the branch checks whether rs = rt, we can put an equality comparator in the Decode stage, thus reducing the penalty of a misprediction. The interesting thing is that by doing that, we need to deal with RAW (read after write) hazards, because of the equality comparator sources, the process is similar to the post above. If the sources are in the Writeback stage, there is no hazard (the write step is made at low clock, and the read step is made at high clock). If the sources are in the Memory stage, we use a simple logic as the picture shows (ForwardAD and ForwardBD), take a look at the combinatory logic, i will not explain. Now, if the sources are in the Execute stage or in the Memory stage of a lw instruction, the Decode stage will be stalled and the Execute stage will be flushed.
When dealing with control hazards, we need to predict the next instructions and flush the pipeline registers if the branch is taken. Since the branch checks whether rs = rt, we can put an equality comparator in the Decode stage, thus reducing the penalty of a misprediction. The interesting thing is that by doing that, we need to deal with RAW (read after write) hazards, because of the equality comparator sources, the process is similar to the post above. If the sources are in the Writeback stage, there is no hazard (the write step is made at low clock, and the read step is made at high clock). If the sources are in the Memory stage, we use a simple logic as the picture shows (ForwardAD and ForwardBD), take a look at the combinatory logic, i will not explain. Now, if the sources are in the Execute stage or in the Memory stage of a lw instruction, the Decode stage will be stalled and the Execute stage will be flushed.
A little thing to notice, when PcSrcD = 1, the decode pipeline register is flushed (as shown in the first picture).
#hacking
Low Level Attacks, Firmware, BIOS, UEFI
https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/bios_uefi.md
Low Level Attacks, Firmware, BIOS, UEFI
https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/bios_uefi.md
GitHub
Infosec_Reference/Draft/bios_uefi.md at master · rmusser01/Infosec_Reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version. - rmusser01/Infosec_Reference
Media is too big
VIEW IN TELEGRAM
#embedded #hardware
FreeBSD: FPGA development of RISC-V 32bit CPU, and buffer overflow demo
source(@BSDJedi) youtube link
https://t.iss.one/FreeBSD/117
FreeBSD: FPGA development of RISC-V 32bit CPU, and buffer overflow demo
source(@BSDJedi) youtube link
https://t.iss.one/FreeBSD/117
Topics: Y Combinator, Lambda Calculus. #programming
https://dreamsongs.com/Files/WhyOfY.pdf
https://mvanier.livejournal.com/2897.html
https://dreamsongs.com/Files/WhyOfY.pdf
https://mvanier.livejournal.com/2897.html
Topics: Linux Configuration, Hardening. #linux
Configuration recommendations of a Gnu/Linux system
- General principles of security and hardening
- Hardware and firmware configuration
- Securing the boot chain
- Configuring system services
- Kernel configuration
- Privilege and access management
- Isolation
https://cyber.gouv.fr/sites/default/files/document/linux_configuration-en-v2.pdf
https://cyber.gouv.fr/publications/configuration-recommendations-gnulinux-system
Configuration recommendations of a Gnu/Linux system
- General principles of security and hardening
- Hardware and firmware configuration
- Securing the boot chain
- Configuring system services
- Kernel configuration
- Privilege and access management
- Isolation
https://cyber.gouv.fr/sites/default/files/document/linux_configuration-en-v2.pdf
https://cyber.gouv.fr/publications/configuration-recommendations-gnulinux-system
❤1
p.file
@p_articles is on again, had to delete due to account problems, no content lost, also check @p_pdfs for some good ebooks
somehow i could get @p_txt back, sorry 💀
❤2
p.file
#hacking #hardware https://www.youtube.com/watch?v=1RipwqJG50c
Topics: Car Hacking. #hacking #hardware
My Car, My Keys: Obtaining CAN Bus SecOC Signing Keys
https://youtu.be/8958gH3KD3Y
My Car, My Keys: Obtaining CAN Bus SecOC Signing Keys
https://youtu.be/8958gH3KD3Y
YouTube
Hardwear.io USA 2024 : My Car, My Keys: Obtaining CAN Bus SecOC Signing Keys - Willem & Greg
In this talk the speakers will explain how we broke the SecOC implementation of a 2021 Model Year vehicle by attacking the power steering ECU. They will give a short introduction on SecOC. Also explain how key management is implemented, and why observing…
p.file
same for #comp_theory #programming #learning https://cseducators.stackexchange.com/questions/2984/book-recommendations-for-rigorous-cs-books https://cseducators.stackexchange.com/questions/tagged/resource-request?tab=newest&page=1&pagesize=15 https://s…
p.file
#learning #playlist #comp_arch #hardware #graphics #info_theory #math Some interesting playlists. comp_arch: Digital Design and Computer Architecture 2021 Digital Design and Computer Architecture 2022 Computer Architecture Introduction to Computer Graphics…
YouTube
Advanced Programming in the UNIX Environment: Week 01 - Introduction
In this video lecture, we provide an introduction to the class CS631 "Advanced Programming in the UNIX Environment" and discuss the purpose of the class, the syllabus, student expectations, as well as available resources.
Slides for this lecture: https:…
Slides for this lecture: https:…
Forwarded from Hardware Tools
GitHub
GitHub - jcldf/ultimate-hardware-hacking-gear-guide-: Unlock Exclusive Insights! 🚀📖 Download My FREE E-Zine Now ➡️ Over 170 Pages…
Unlock Exclusive Insights! 🚀📖 Download My FREE E-Zine Now ➡️ Over 170 Pages of Essential Content! Elevate your hardware hacking game with insider tips and the latest trends. Don’t miss out—grab yo...
Topics: Kernel Exploits. #linux #hacking
Linux kernel exploit development
https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development
Linux kernel exploit development
https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development
breaking-bits.gitbook.io
Linux kernel exploit development | Breaking Bits