 Class LayoutR5,R2 MOV R6,R3 BL _Z9terminateP2HRP6Salary MOV R1,R5 MOV R0,R4 BL _Z9terminateP2HRP6Hourly MOV R1,R6 MOV R0,R4 POP {R4‐R6,LR} B _Z9terminateP2HRP4Temp R2 MOV R6,R3 BL _ZN2HR9terminateEP6Salary MOV R1,R5 MOV R0,R4 BL _ZN2HR9terminateEP6Hourly MOV R1,R6 MOV R0,R4 POP {R4‐R6,LR} B _ZN2HR9terminateEP4Temp into "this" register LDR R1,[R4, #+0] # get bp‐>vptr LDR R1,[R1, #+0] # get vptr[0] (member function address) MOV LR,PC # set return link BX R1 # call member function0 码力 | 51 页 | 461.37 KB | 6 月前3 Class LayoutR5,R2 MOV R6,R3 BL _Z9terminateP2HRP6Salary MOV R1,R5 MOV R0,R4 BL _Z9terminateP2HRP6Hourly MOV R1,R6 MOV R0,R4 POP {R4‐R6,LR} B _Z9terminateP2HRP4Temp R2 MOV R6,R3 BL _ZN2HR9terminateEP6Salary MOV R1,R5 MOV R0,R4 BL _ZN2HR9terminateEP6Hourly MOV R1,R6 MOV R0,R4 POP {R4‐R6,LR} B _ZN2HR9terminateEP4Temp into "this" register LDR R1,[R4, #+0] # get bp‐>vptr LDR R1,[R1, #+0] # get vptr[0] (member function address) MOV LR,PC # set return link BX R1 # call member function0 码力 | 51 页 | 461.37 KB | 6 月前3
 C++ Exceptions for Smaller Firmware828c <__cxa_allocate_exception> 8014: 2305 movs r3, #5 8016: 4902 ldr r1, [pc, #8] 8018: 6003 str r3, [r0, #0] 801a: 2200 movs r2, #0 801c: Additional parameters will be passed on the stack if the inputs exceed what can be passed in the registers R1 R2 R3 R4 Preserved Registers: Must be restored before a subroutine returns. On function entry: Needed 0x3FD0 obj[2/3] 0x3FCC obj[3/3] 0x3FC8 bar()+14 0x3FC4 [bar] r4 Virtual ARM CPU Reg Value R0 XXXX R1 XXXX R2 XXXX R3 XXXX R4 ? R5 ? R6 – R7 – R8 – R9 – R10 – R11 – R12 – R13/SP ? R14/LR0 码力 | 237 页 | 6.74 MB | 6 月前3 C++ Exceptions for Smaller Firmware828c <__cxa_allocate_exception> 8014: 2305 movs r3, #5 8016: 4902 ldr r1, [pc, #8] 8018: 6003 str r3, [r0, #0] 801a: 2200 movs r2, #0 801c: Additional parameters will be passed on the stack if the inputs exceed what can be passed in the registers R1 R2 R3 R4 Preserved Registers: Must be restored before a subroutine returns. On function entry: Needed 0x3FD0 obj[2/3] 0x3FCC obj[3/3] 0x3FC8 bar()+14 0x3FC4 [bar] r4 Virtual ARM CPU Reg Value R0 XXXX R1 XXXX R2 XXXX R3 XXXX R4 ? R5 ? R6 – R7 – R8 – R9 – R10 – R11 – R12 – R13/SP ? R14/LR0 码力 | 237 页 | 6.74 MB | 6 月前3
 A Relaxed Guide to memory_order_relaxedlocations. ● r1 and r2 denote (not-address-taken) locals (“registers”). ● All shared locations are presumed to be initially zero, null, or false, unless stated otherwise. ● r1 =rlx x abbreviates r1 = x.l =rlx r1 abbreviates x.store(r1, std::memory_order_relaxed) Notation and conventionsProprietary + Confidential atomic A Relaxed Guide to memory_order_relaxedlocations. ● r1 and r2 denote (not-address-taken) locals (“registers”). ● All shared locations are presumed to be initially zero, null, or false, unless stated otherwise. ● r1 =rlx x abbreviates r1 = x.l =rlx r1 abbreviates x.store(r1, std::memory_order_relaxed) Notation and conventionsProprietary + Confidential atomic- x(0), y(0); Must be allowed // y = x; int r1 =rlx x; y =rlx r1; // 1: Thread 2: 7 r1 = r2 = 42 is fine! reads from reads fromProprietary + Confidential atomic - x(0), y(0); OOTA: Should be disallowed // y = x; int r1 =rlx x; y =rlx r1; // x = y; int 0 码力 | 32 页 | 278.53 KB | 6 月前3
 Lifetime Safety in C++: Past, Present and FutureType Systems for Memory Safety (borretti.me) let num = 5; let r1 = &num as *const i32; let r2 = # unsafe { println!("r1 is: {}", *r1); println!("r2 is: {}", r2); }Building a safe subset from scratch Type Systems for Memory Safety (borretti.me) let num = 5; let r1 = &num as *const i32; let r2 = # unsafe { println!("r1 is: {}", *r1); println!("r2 is: {}", r2); }Building a safe subset from scratch Type Systems for Memory Safety (borretti.me) let num = 5; let r1 = &num as *const i32; let r2 = # unsafe { println!("r1 is: {}", *r1); println!("r2 is: {}", r2); }Building a safe subset from scratch0 码力 | 124 页 | 2.03 MB | 6 月前3 Lifetime Safety in C++: Past, Present and FutureType Systems for Memory Safety (borretti.me) let num = 5; let r1 = &num as *const i32; let r2 = # unsafe { println!("r1 is: {}", *r1); println!("r2 is: {}", r2); }Building a safe subset from scratch Type Systems for Memory Safety (borretti.me) let num = 5; let r1 = &num as *const i32; let r2 = # unsafe { println!("r1 is: {}", *r1); println!("r2 is: {}", r2); }Building a safe subset from scratch Type Systems for Memory Safety (borretti.me) let num = 5; let r1 = &num as *const i32; let r2 = # unsafe { println!("r1 is: {}", *r1); println!("r2 is: {}", r2); }Building a safe subset from scratch0 码力 | 124 页 | 2.03 MB | 6 月前3
 Thinking Functionally In C++typename R1> using MappingFunction = R1 (*)(const T1&); template Thinking Functionally In C++typename R1> using MappingFunction = R1 (*)(const T1&); template- R1> std::vector<R1> Map(const std::vector - sourceList, MappingFunction - R1> mappingFunc) { std::vector<R1> mappedList; typename R1> using MappingFunction = R1 (*)(const T1&); template - R1> std::vector<R1> Map(const std::vector - sourceList, MappingFunction - R1> mappingFunc) { std::vector<R1> mappedList; typename R1> using MappingFunction = R1 (*)(const T1&); template - R1> std::vector<R1> Map(const std::vector - sourceList, MappingFunction - R1> mappingFunc) { std::vector<R1> mappedList; 0 码力 | 114 页 | 3.14 MB | 6 月前3
 Hyperledger Fabric 1.3 Documentationthrough this topic, we will build up the network piece by piece, so that you see how the organizations R1, R2, R3 and R4 contribute infrastructure to the network to help form it. This infrastructure implements consume the ledger and smart contract services provided by the blockchain network. Four organizations, R1, R2, R3 and R4 have jointly decided, and written into an agreement, that they will set up and exploit perform business transactions on the network. R1 and R2 have a need for a private communications within the overall network, as do R2 and R3. Organization R1 has a client application that can perform business0 码力 | 528 页 | 6.85 MB | 1 年前3 Hyperledger Fabric 1.3 Documentationthrough this topic, we will build up the network piece by piece, so that you see how the organizations R1, R2, R3 and R4 contribute infrastructure to the network to help form it. This infrastructure implements consume the ledger and smart contract services provided by the blockchain network. Four organizations, R1, R2, R3 and R4 have jointly decided, and written into an agreement, that they will set up and exploit perform business transactions on the network. R1 and R2 have a need for a private communications within the overall network, as do R2 and R3. Organization R1 has a client application that can perform business0 码力 | 528 页 | 6.85 MB | 1 年前3
 Hyperledger Fabric 1.3 Documentationthrough this topic, we will build up the network piece by piece, so that you see how the organizations R1, R2, R3 and R4 contribute infrastructure to the network to help form it. This infrastructure implements Chapter 4. Key Concepts hyperledger-fabricdocs Documentation, Release master Four organizations, R1, R2, R3 and R4 have jointly decided, and written into an agreement, that they will set up and exploit perform business transactions on the network. R1 and R2 have a need for a private communications within the overall network, as do R2 and R3. Organization R1 has a client application that can perform business0 码力 | 367 页 | 4.95 MB | 1 年前3 Hyperledger Fabric 1.3 Documentationthrough this topic, we will build up the network piece by piece, so that you see how the organizations R1, R2, R3 and R4 contribute infrastructure to the network to help form it. This infrastructure implements Chapter 4. Key Concepts hyperledger-fabricdocs Documentation, Release master Four organizations, R1, R2, R3 and R4 have jointly decided, and written into an agreement, that they will set up and exploit perform business transactions on the network. R1 and R2 have a need for a private communications within the overall network, as do R2 and R3. Organization R1 has a client application that can perform business0 码力 | 367 页 | 4.95 MB | 1 年前3
 Adventures in SIMD Thinking (Part 1 of 2)rf_512 r) { _mm512_mask_storeu_ps(pdst, (__mmask16) 0xFFFFu, r); } r0 r1 r2 r3 r4 r5 r6 r7 r8 r9 r10 r11 r12 r13 r14 r15 r0 r1 r2 r3 r4 r5 r6 r7 r8 r9 r10 r11 r12 r13 r14 r15 r pdst pdstCopyright 0 0 1 1 0 0 1 1 0 0 0 0 1 1 1 1 m0 m1 r2 r3 m4 m5 r6 r7 m8 m9 m10 m11 r12 r13 r14 r15 r mask r0 r1 r2 r3 r4 r5 r6 r7 r8 r9 r10 r11 r12 r13 r14 r15 pdst pdstCopyright © 2020 Bob Steagall K E W B C _mm512_permutexvar_ps(perm, r); } r0 r1 r2 r3 r4 r5 r6 r7 r8 r9 r10 r11 r12 r13 r14 r15 r 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0 perm r15 r14 r13 r12 r11 r10 r9 r8 r7 r6 r5 r4 r3 r2 r1 r0Copyright © 2020 Bob Steagall0 码力 | 88 页 | 824.07 KB | 6 月前3 Adventures in SIMD Thinking (Part 1 of 2)rf_512 r) { _mm512_mask_storeu_ps(pdst, (__mmask16) 0xFFFFu, r); } r0 r1 r2 r3 r4 r5 r6 r7 r8 r9 r10 r11 r12 r13 r14 r15 r0 r1 r2 r3 r4 r5 r6 r7 r8 r9 r10 r11 r12 r13 r14 r15 r pdst pdstCopyright 0 0 1 1 0 0 1 1 0 0 0 0 1 1 1 1 m0 m1 r2 r3 m4 m5 r6 r7 m8 m9 m10 m11 r12 r13 r14 r15 r mask r0 r1 r2 r3 r4 r5 r6 r7 r8 r9 r10 r11 r12 r13 r14 r15 pdst pdstCopyright © 2020 Bob Steagall K E W B C _mm512_permutexvar_ps(perm, r); } r0 r1 r2 r3 r4 r5 r6 r7 r8 r9 r10 r11 r12 r13 r14 r15 r 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0 perm r15 r14 r13 r12 r11 r10 r9 r8 r7 r6 r5 r4 r3 r2 r1 r0Copyright © 2020 Bob Steagall0 码力 | 88 页 | 824.07 KB | 6 月前3
 Hyperledger Fabric 1.4.8 Documentationthrough this topic, we will build up the network piece by piece, so that you see how the organizations R1, R2, R3 and R4 contribute infrastructure to the network to help form it. This infrastructure implements consume the ledger and smart contract services provided by the blockchain network. Four organizations, R1, R2, R3 and R4 have jointly decided, and written into an agreement, that they will set up and exploit perform business transactions on the network. R1 and R2 have a need for a private communications within the overall network, as do R2 and R3. Organization R1 has a client application that can perform business0 码力 | 699 页 | 9.02 MB | 1 年前3 Hyperledger Fabric 1.4.8 Documentationthrough this topic, we will build up the network piece by piece, so that you see how the organizations R1, R2, R3 and R4 contribute infrastructure to the network to help form it. This infrastructure implements consume the ledger and smart contract services provided by the blockchain network. Four organizations, R1, R2, R3 and R4 have jointly decided, and written into an agreement, that they will set up and exploit perform business transactions on the network. R1 and R2 have a need for a private communications within the overall network, as do R2 and R3. Organization R1 has a client application that can perform business0 码力 | 699 页 | 9.02 MB | 1 年前3
 Hyperledger Fabric 1.4.9 Documentationthrough this topic, we will build up the network piece by piece, so that you see how the organizations R1, R2, R3 and R4 contribute infrastructure to the network to help form it. This infrastructure implements Chapter 4. Key Concepts hyperledger-fabricdocs Documentation, Release master Four organizations, R1, R2, R3 and R4 have jointly decided, and written into an agreement, that they will set up and exploit perform business transactions on the network. R1 and R2 have a need for a private communications within the overall network, as do R2 and R3. Organization R1 has a client application that can perform business0 码力 | 483 页 | 7.48 MB | 1 年前3 Hyperledger Fabric 1.4.9 Documentationthrough this topic, we will build up the network piece by piece, so that you see how the organizations R1, R2, R3 and R4 contribute infrastructure to the network to help form it. This infrastructure implements Chapter 4. Key Concepts hyperledger-fabricdocs Documentation, Release master Four organizations, R1, R2, R3 and R4 have jointly decided, and written into an agreement, that they will set up and exploit perform business transactions on the network. R1 and R2 have a need for a private communications within the overall network, as do R2 and R3. Organization R1 has a client application that can perform business0 码力 | 483 页 | 7.48 MB | 1 年前3
共 295 条
- 1
- 2
- 3
- 4
- 5
- 6
- 30














 
 