Intel® Visual Compute Accelerator Product Family Software Guide

Total Page:16

File Type:pdf, Size:1020Kb

Intel® Visual Compute Accelerator Product Family Software Guide Intel® Visual Compute Accelerator Product Family Software Guide Reference for setting up Intel® Visual Compute Accelerator product family software. Rev 2.3 December 2018 Intel® Server Products and Solutions <Blank page> Intel® Visual Compute Accelerator Software Guide Document Revision History Date Revision Changes December 2018 2.3 Aligned with Intel® VCA Software 2.3 public release. July 2018 2.2 Aligned with Intel® VCA Software 2.2 public release. May 2018 2.1.5 Aligned with Intel® VCA Software 2.1 public release. Feburary 2018 2.1.1 Added clarifications, details and rearranged sections. November 2017 2.1 Updated sections A.2 and A.4.2.3. November 2017 2.0 Aligned with 2.0 VCA software public release. New features: supports XEN and KVM; support Windows OS baremetal images; support blockIO devices; support kernel crash dump; support m.2. July 2017 1.6 Reorganized chapters and sections. Applied new formatting and edited for clarity. March 2017 1.5.0 Aligned with 1.5 VCA Software public Release. VCA Software 1.5 is the first release which supports both VCA1283LVV and VCA1585LMV. October 2016 1.3.0 Aligned with 1.3 VCA Software Public Release. July 2016 1.2.2 Fixed incorrect documentation in section 7.18; Fixed typos; Changed vca_os_repo to local_repo in section 14 to synch with build_scripts values. July 2016 1.2.1 Fixed typos and broken references; Added Bridge Configuration section; Expanded vcactl config section May 2016 1.2.0 Aligned with 1.2 VCA Software Public Release December 2015 1.01 Minor corrections November 2015 1.0 First Public Release 3 Intel® Visual Compute Accelerator Software Guide Disclaimers Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software, or service activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your system manufacturer or retailer or learn more at intel.com. You may not use or facilitate the use of this document in connection with any infringement or other legal analysis concerning Intel products described herein. You agree to grant Intel a non-exclusive, royalty-free license to any patent claim thereafter drafted which includes subject matter disclosed herein. No license (express or implied, by estoppel or otherwise) to any intellectual property rights is granted by this document. The products described may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Intel disclaims all express and implied warranties, including without limitation, the implied warranties of merchantability, fitness for a particular purpose, and non-infringement, as well as any warranty arising from course of performance, course of dealing, or usage in trade. Copies of documents which have an order number and are referenced in this document may be obtained by calling 1-800-548-4725 or by visiting www.intel.com/design/literature.htm. Intel, the Intel logo, Iris, Xeon, and Intel Xeon Phi are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries. *Other names and brands may be claimed as the property of others. © Intel Corporation 4 Intel® Visual Compute Accelerator Software Guide Table of Contents 1. Introduction ............................................................................................................................................................... 11 1.1 Notes on Example Commands ................................................................................................................................. 11 2. Intel® Visual Compute Accelerator Overview ..................................................................................................... 12 3. Architecture Overview ............................................................................................................................................. 14 3.1 Hardware Architecture ................................................................................................................................................. 14 3.2 Software Architecture .................................................................................................................................................. 15 3.2.1 Software Support Matrix ............................................................................................................................................. 17 4. System Setup............................................................................................................................................................. 20 4.1 Configuring the Host System .................................................................................................................................... 20 4.1.1 Configure the Host BIOS ............................................................................................................................................. 20 4.1.2 Install the Operating System ..................................................................................................................................... 20 4.1.3 Configure Network Settings ....................................................................................................................................... 21 4.2 Physical Installation of the Intel® VCA Card ........................................................................................................ 21 4.2.1 Optional Hardware (Intel® VCA 2 only) ................................................................................................................. 21 4.3 Installing Intel® VCA Software ................................................................................................................................... 21 4.3.1 Required Software ......................................................................................................................................................... 22 4.3.2 Required Firmware ........................................................................................................................................................ 22 4.3.3 Optional Software .......................................................................................................................................................... 22 4.3.4 Install VCA Software on Host .................................................................................................................................... 22 4.3.5 Updating EEPROM ......................................................................................................................................................... 24 4.3.6 Updating BIOS ................................................................................................................................................................. 24 4.4 Enabling Virtual Network ............................................................................................................................................ 25 4.4.1 Configuring Nodes for Bridged Mode Operation .............................................................................................. 25 4.4.2 Creating NAT .................................................................................................................................................................... 27 4.5 Booting the Intel® VCA Card ...................................................................................................................................... 28 4.5.1 Intel® VCA Volatile Reference Package ................................................................................................................. 30 4.5.2 Intel® VCA Persistent over BlockIO (Intel® VCA software version 2.0 and above) .............................. 30 4.5.3 Intel® VCA Persistent over NFS (Intel® VCA software version 1.5 and lower only) ............................. 31 4.5.4 Manually Creating a Persistent File System Using NFS .................................................................................. 33 4.5.5 Running Baremetal Image on Intel® VCA ............................................................................................................. 35 4.5.6 Running KVM Virtulization on Intel® VCA ............................................................................................................ 36 4.5.7 Running KVM-GT Virtualization on Intel® VCA .................................................................................................. 49 4.5.8 Running XEN Virtualization on Intel® VCA ........................................................................................................... 51 4.5.9 Using Block Devices (via BlockIO) ........................................................................................................................... 62 5. Using the Intel® VCA Product Family Software .................................................................................................. 66 5.1 Using Intel® Media Server Studio ............................................................................................................................. 66 5.2 Running a Sample Transcode ................................................................................................................................... 67 6. Intel® VCA Utility (vcactl) ....................................................................................................................................
Recommended publications
  • Creating Rpms Guide
    CREATING RPMS (Student version) v1.0 Featuring 36 pages of lecture and a 48 page lab exercise This docu m e n t serves two purpose s: 1. Representative sample to allow evaluation of our courseware manuals 2. Make available high quality RPM documentation to Linux administrators A bout this m aterial : The blue background you see simulates the custom paper that all Guru Labs course w are is printed on. This student version does not contain the instructor notes and teaching tips present in the instructor version. For more information on all the features of our unique layout, see: http://ww w . g urulabs.co m /courseware/course w are_layout.php For more freely available Guru Labs content (and the latest version of this file), see: http://www.gurulabs.co m/goodies/ This sample validated on: Red Hat Enterprise Linux 4 & Fedora Core v3 SUSE Linux Enterprise Server 9 & SUSE Linux Professional 9.2 About Guru Labs: Guru Labs is a Linux training company started in 199 9 by Linux experts to produce the best Linux training and course w are available. For a complete list, visit our website at: http://www.gurulabs.co m/ This work is copyrighted Guru Labs, L.C. 2005 and is licensed under the Creative Common s Attribution- NonCom mer cial- NoDerivs License. To view a copy of this license, visit http://creativecom m o n s.org/licenses/by- nc- nd/2.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 943 0 5, USA. Guru Labs 801 N 500 W Ste 202 Bountiful, UT 84010 Ph: 801-298-5227 WWW.GURULABS.COM Objectives: • Understand
    [Show full text]
  • Nessus 8.3 User Guide
    Nessus 8.3.x User Guide Last Updated: September 24, 2021 Table of Contents Welcome to Nessus 8.3.x 12 Get Started with Nessus 15 Navigate Nessus 16 System Requirements 17 Hardware Requirements 18 Software Requirements 22 Customize SELinux Enforcing Mode Policies 25 Licensing Requirements 26 Deployment Considerations 27 Host-Based Firewalls 28 IPv6 Support 29 Virtual Machines 30 Antivirus Software 31 Security Warnings 32 Certificates and Certificate Authorities 33 Custom SSL Server Certificates 35 Create a New Server Certificate and CA Certificate 37 Upload a Custom Server Certificate and CA Certificate 39 Trust a Custom CA 41 Create SSL Client Certificates for Login 43 Nessus Manager Certificates and Nessus Agent 46 Install Nessus 48 Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade- marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective Download Nessus 49 Install Nessus 51 Install Nessus on Linux 52 Install Nessus on Windows 54 Install Nessus on Mac OS X 56 Install Nessus Agents 58 Retrieve the Linking Key 59 Install a Nessus Agent on Linux 60 Install a Nessus Agent on Windows 64 Install a Nessus Agent on Mac OS X 70 Upgrade Nessus and Nessus Agents 74 Upgrade Nessus 75 Upgrade from Evaluation 76 Upgrade Nessus on Linux 77 Upgrade Nessus on Windows 78 Upgrade Nessus on Mac OS X 79 Upgrade a Nessus Agent 80 Configure Nessus 86 Install Nessus Home, Professional, or Manager 87 Link to Tenable.io 88 Link to Industrial Security 89 Link to Nessus Manager 90 Managed by Tenable.sc 92 Manage Activation Code 93 Copyright © 2021 Tenable, Inc.
    [Show full text]
  • I386-Engine™ Technical Manual
    i386-Engine™ C/C++ Programmable, 32-bit Microprocessor Module Based on the Intel386EX Technical Manual 1950 5 th Street, Davis, CA 95616, USA Tel: 530-758-0180 Fax: 530-758-0181 Email: [email protected] http://www.tern.com Internet Email: [email protected] http://www.tern.com COPYRIGHT i386-Engine, VE232, A-Engine, A-Core, C-Engine, V25-Engine, MotionC, BirdBox, PowerDrive, SensorWatch, Pc-Co, LittleDrive, MemCard, ACTF, and NT-Kit are trademarks of TERN, Inc. Intel386EX and Intel386SX are trademarks of Intel Coporation. Borland C/C++ are trademarks of Borland International. Microsoft, MS-DOS, Windows, and Windows 95 are trademarks of Microsoft Corporation. IBM is a trademark of International Business Machines Corporation. Version 2.00 October 28, 2010 No part of this document may be copied or reproduced in any form or by any means without the prior written consent of TERN, Inc. © 1998-2010 1950 5 th Street, Davis, CA 95616, USA Tel: 530-758-0180 Fax: 530-758-0181 Email: [email protected] http://www.tern.com Important Notice TERN is developing complex, high technology integration systems. These systems are integrated with software and hardware that are not 100% defect free. TERN products are not designed, intended, authorized, or warranted to be suitable for use in life-support applications, devices, or systems, or in other critical applications. TERN and the Buyer agree that TERN will not be liable for incidental or consequential damages arising from the use of TERN products. It is the Buyer's responsibility to protect life and property against incidental failure. TERN reserves the right to make changes and improvements to its products without providing notice.
    [Show full text]
  • DOS Virtualized in the Linux Kernel
    DOS Virtualized in the Linux Kernel Robert T. Johnson, III Abstract Due to the heavy dominance of Microsoft Windows® in the desktop market, some members of the software industry believe that new operating systems must be able to run Windows® applications to compete in the marketplace. However, running applications not native to the operating system generally causes their performance to degrade significantly. When the application and the operating system were written to run on the same machine architecture, all of the instructions in the application can still be directly executed under the new operating system. Some will only need to be interpreted differently to provide the required functionality. This paper investigates the feasibility and potential to speed up the performance of such applications by including the support needed to run them directly in the kernel. In order to avoid the impact to the kernel when these applications are not running, the needed support was built as a loadable kernel module. 1 Introduction New operating systems face significant challenges in gaining consumer acceptance in the desktop marketplace. One of the first realizations that must be made is that the majority of this market consists of non-technical users who are unlikely to either understand or have the desire to understand various technical details about why the new operating system is “better” than a competitor’s. This means that such details are extremely unlikely to sway a large amount of users towards the operating system by themselves. The incentive for a consumer to continue using their existing operating system or only upgrade to one that is backwards compatible is also very strong due to the importance of application software.
    [Show full text]
  • Enclave Security and Address-Based Side Channels
    Graz University of Technology Faculty of Computer Science Institute of Applied Information Processing and Communications IAIK Enclave Security and Address-based Side Channels Assessors: A PhD Thesis Presented to the Prof. Stefan Mangard Faculty of Computer Science in Prof. Thomas Eisenbarth Fulfillment of the Requirements for the PhD Degree by June 2020 Samuel Weiser Samuel Weiser Enclave Security and Address-based Side Channels DOCTORAL THESIS to achieve the university degree of Doctor of Technical Sciences; Dr. techn. submitted to Graz University of Technology Assessors Prof. Stefan Mangard Institute of Applied Information Processing and Communications Graz University of Technology Prof. Thomas Eisenbarth Institute for IT Security Universit¨atzu L¨ubeck Graz, June 2020 SSS AFFIDAVIT I declare that I have authored this thesis independently, that I have not used other than the declared sources/resources, and that I have explicitly indicated all material which has been quoted either literally or by content from the sources used. The text document uploaded to TUGRAZonline is identical to the present doctoral thesis. Date, Signature SSS Prologue Everyone has the right to life, liberty and security of person. Universal Declaration of Human Rights, Article 3 Our life turned digital, and so did we. Not long ago, the globalized commu- nication that we enjoy today on an everyday basis was the privilege of a few. Nowadays, artificial intelligence in the cloud, smartified handhelds, low-power Internet-of-Things gadgets, and self-maneuvering objects in the physical world are promising us unthinkable freedom in shaping our personal lives as well as society as a whole. Sadly, our collective excitement about the \new", the \better", the \more", the \instant", has overruled our sense of security and privacy.
    [Show full text]
  • Redesigning Src2pkg, a Linux Package Creation Toolkit
    Redesigning src2pkg, a Linux package creation toolkit Timothy Goya December 4, 2009 Senior Project COMPUTER SCIENCE DEPARTMENT California Polytechnic State University San Luis Obispo 2009 1 Contents 1 Introduction 3 2 Background 4 2.1 GNU Coding Standards . 4 2.2 CheckInstall . 4 2.3 src2pkg 1.x . 4 3 Description 5 3.1 Flexibility and coupling . 5 3.2 A simple example script . 5 3.3 Other interesting functions . 6 3.4 Modules . 6 3.4.1 Build systems . 6 3.4.2 Sandboxing methods . 7 3.4.3 Package formats . 7 4 Evaluation 7 5 Really Cool Bash Features 8 5.1 /dev/tcp . 8 5.2 Manipulating Binary . 9 5.3 Localization . 9 6 Conclusions 9 2 Acknowledgments Many thanks to Dr. Phillip Nico for his saintly patience and understanding during his time as my senior project advisor. Special thanks to Gilbert Ashley, the author of src2pkg, for his approval and support throughout this redesign. Thanks to Piete Sartain for adminstrating the src2pkg wiki and Drew Ames for the writing much of the great documentation on the src2pkg wiki. I would also like to thank Dr. Alexander Dekhtyar for acting as my advisor for my rst senior project idea. Abstract Package managers ease installation and removal of applications. How- ever, as the name indicates, in order for a package manager to be useful, they need packages created from upstream sources to manage. This is the purpose of src2pkg, a toolkit written in Bash shell script which automates many package creation tasks. src2pkg, however, suers from major de- sign aws that cripple its ability to package some exotic upstream sources.
    [Show full text]
  • MILITARY I386tm SX MICROPROCESSOR
    MILITARY i386TM SX MICROPROCESSOR Y Full 32-Bit Internal Architecture Y Virtual M8086 Mode Allows Execution Ð 8-, 16-, 32-Bit Data Types of M8086 Software in a Protected and Ð 8 General Purpose 32-Bit Registers Paged System Y Runs Intel386TM Software in a Cost Y High Speed Numerics Support with the Effective 16-Bit Hardware Environment Military i387TM SX Coprocessor Ð Runs Same Applications and O.S.'s Y On-Chip Debugging Support Including TM as the Military i386 DX Processor Breakpoint Registers Ð Object Code Compatible with M8086, M80186, M80286, and i386 Y Complete System Development Processors Support Ð Runs MS-DOS*, OS/2* and UNIX** Ð Software: C, PL/M, Assembler Ð Debuggers: PMON-i386 DX, Y Very High Performance 16-Bit Data Bus ICETM-i386 SX Ð 20 MHz Clock Ð Extensive Third-Party Support: C, Ð Two-Clock Bus Cycles Pascal, FORTRAN, BASIC, Ada*** on Ð 20 Megabytes/Sec Bus Bandwidth VAX, UNIX**, MS-DOS*, and Other Ð Address Pipelining Allows Use of Hosts Slower/Cheaper Memories Y High Speed CHMOS IV Technology Y Integrated Memory Management Unit Ð Virtual Memory Support Y 88-Lead Pin Grid Array Package Ð Optional On-Chip Paging (See Packaging Specification, Order Ý 231369) Ð 4 Levels of Hardware Enforced Y 100-Lead Plastic Flat Pack Package Protection Y Available in Four Product Grades: Ð MMU Fully Compatible with Those of Ð MIL-STD-883 (PGA), b55§Cto the M80286 and i386 DX CPUs a125§C(TC) Y Large Uniform Address Space Ð Military Temperature Only (PGA), Ð 16 Megabyte Physical b55§Ctoa125§C(TC) Ð 64 Terabyte Virtual Ð Extended Temperature (PGA), Ð 4 Gigabyte Maximum Segment Size b40§Ctoa110§C(TC) Ð Extended Temperature (PQFP), b20§Ctoa100§C(TC) The Military i386 SX Microprocessor is a 32-bit CPU with a 16-bit external data bus and a 24-bit external address bus.
    [Show full text]
  • Computer Architectures an Overview
    Computer Architectures An Overview PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 25 Feb 2012 22:35:32 UTC Contents Articles Microarchitecture 1 x86 7 PowerPC 23 IBM POWER 33 MIPS architecture 39 SPARC 57 ARM architecture 65 DEC Alpha 80 AlphaStation 92 AlphaServer 95 Very long instruction word 103 Instruction-level parallelism 107 Explicitly parallel instruction computing 108 References Article Sources and Contributors 111 Image Sources, Licenses and Contributors 113 Article Licenses License 114 Microarchitecture 1 Microarchitecture In computer engineering, microarchitecture (sometimes abbreviated to µarch or uarch), also called computer organization, is the way a given instruction set architecture (ISA) is implemented on a processor. A given ISA may be implemented with different microarchitectures.[1] Implementations might vary due to different goals of a given design or due to shifts in technology.[2] Computer architecture is the combination of microarchitecture and instruction set design. Relation to instruction set architecture The ISA is roughly the same as the programming model of a processor as seen by an assembly language programmer or compiler writer. The ISA includes the execution model, processor registers, address and data formats among other things. The Intel Core microarchitecture microarchitecture includes the constituent parts of the processor and how these interconnect and interoperate to implement the ISA. The microarchitecture of a machine is usually represented as (more or less detailed) diagrams that describe the interconnections of the various microarchitectural elements of the machine, which may be everything from single gates and registers, to complete arithmetic logic units (ALU)s and even larger elements.
    [Show full text]
  • Checkinstall
    LinuxFocus article number 360 http://linuxfocus.org CheckInstall by Mario M. Knopf (homepage) About the author: Mario enjoys working with Linux, networks Abstract: and security related topics. Checkinstall is utility to automatically build RPM/Debian or Slackware packages from tar.gz source pages. This makes it possible to do a "clean" installation and de−installation of almost any source code tar.gz package. Translated to English _________________ _________________ _________________ by: Mario M. Knopf (homepage) Introduction It often happens that the program which one certainly would like to test, is only available as tar.gz source code (no rpm or Debian package available). In such a case, you download the source package, unpack it and compile it manually. So far, so good. However, what happens if you like to delete the program? The Makefile contains only in very few cases an appropriate routine to uninstall the program. Of course there is the possibility of installing the program into a temporary directory and write down all of the files which were created or modified by the installation for a later removing. But this procedure is painful and very extensive, if programs are frequently compiled from the sources. The tool CheckInstall [1] written by Felipe Eduardo Sánchez Díaz Durán solves this problem. As a rule, you compile and install a GNU Autoconf compliant program under use of the widely known command sequence ./configure && make && make install. The configure shell script attempts to guess correct values for various system−dependent variables, which are used later during the compilation. It checks whether all requirements for compilation are fulfilled and uses those values to create a Makefile in each directory of the package.
    [Show full text]
  • Intel® Itanium™ Processor- Specific Application Binary Interface (ABI)
    Intel® Itanium™ Processor- specific Application Binary Interface (ABI) May 2001 Document Number: 245370-003 Information in this document is provided in connection with Intel® products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel's Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel products are not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked “reserved” or “undefined.” Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The Itanium processor may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order. Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained by calling 1-800-548-4725, or by visiting Intel’s website at http://developer.intel.com/design/litcentr.
    [Show full text]
  • System Administration
    System Administration Application Management Application Management ● A common task for a system administrator is the installation, updating and removal of software. Several ideas exist to make that an easier job Application Management ● Most linux distributions have some sort of package manager, which allows for easier installation, removal and updating of software. ● They also typically have some sort of dependency checking, allowing administrators to know about dependencies between packages, and (with some package managers) to handle automatically those dependancies ./configure; make; make install ● The traditional approach to UNIX application installation ● Application is shipped in a "tarball" file ● The tarball file is unpacked with the tar command, then make is used to compile and install the application Tarball Demonstration ● Download the sample tarball from the website ● Execute the following commands: tar -xzvf magicrescue-1.1.5.tar.gz cd magicrescue-1.1.5 ./configure make su make install Tarball Limitations ● How do I uninstall this package? Sometimes there©s a make uninstall ● What packages are installed on my system? ● How do I keep those packages up to date? The RedHat Package Manager ● RPM is the default package manager for Red Hat Linux systems. ● It deals with .rpm files, which contain the actual programs as well as various bits of meta- information about the package: what it is, where it came from, version information and info about package dependencies. RPM Commands ● rpm -ivh <filename(s)> Installs (-i) packages. The -vh causes rpm to be verbose about what it is doing and to print hash marks (#) as it is installing packages ● rpm -Uvh <filename(s)> Updates (-U) packages.
    [Show full text]
  • Evaluation of X32 ABI for Virtualization and Cloud
    Evaluation of X32 ABI for Virtualization and Cloud Jun Nakajima Intel Corporation 1 Wednesday, August 29, 12 1 Agenda • What is X32 ABI? • Benefits for Virtualization & Cloud • Evaluation of X32 • Summary 2 Wednesday, August 29, 12 2 x32 ABI Basics • x86-64 ABI but with 32-bit longs and pointers • 64-bit arithmetic • Fully utilize modern x86 • 8 additional integer registers (16 total) • 8 additional SSE registers • SSE for FP math • 64-bit kernel is required - Linux kernel 3.4 has support for x32 Same memory footprint as x86 with advantages of x86-64. No hardware changes are required. 3 Wednesday, August 29, 12 3 ABI Comparison i386 x86-64 x32 Integer registers 6 15 15 FP registers 8 16 16 Pointers 4 bytes 8 bytes 4 bytes 64-bit arithmetic No Yes Yes Floating point x87 SSE SSE Calling convention Memory Registers Registers PIC prologue 2-3 insn None None 4 Wednesday, August 29, 12 4 The x32 Performance Advantage • In the order of Expected Contribution: - Efficient Position Independent Code - Efficient Function Parameter Passing - Efficient 64-bit Arithmetic - Efficient Floating Point Operations X32 is expected to give a 10-20% performance boost for C, C++ 5 Wednesday, August 29, 12 5 Efficient Position Independent Code extern int x, y, z; void foo () { z = x * y; } i386 psABI x32 psABI call __i686.get_pc_thunk.cx movl x@GOTPCREL(%rip), %edx addl $_GLOBAL_OFFSET_TABLE_, %ecx movl y@GOTPCREL(%rip), %eax movl!y@GOT(%ecx), %eax movl (%rax), %rax movl!x@GOT(%ecx), %edx imull (%rdx), %rax movl!(%eax), %eax movl z@GOTPCREL(%rip), %edx imull!(%edx),
    [Show full text]