Table of Contents

1

Introduction

 

 

1.1

The Alpha Approach to RISC Architecture

1–1

 

1.2

Data Format Overview

1–3

 

1.3

Instruction Format Overview

1–4

 

1.4

Instruction Overview

1–4

 

1.5

Instruction Set Characteristics

1–6

 

1.6

Terminology and Conventions

1–6

 

1.6.1

Numbering

1–7

 

1.6.2

Security Holes

1–7

 

1.6.3

UNPREDICTABLE and UNDEFINED

1–7

 

1.6.4

Ranges and Extents

1–8

 

1.6.5

ALIGNED and UNALIGNED

1–8

 

1.6.6

Must Be Zero (MBZ)

1–9

 

1.6.7

Read As Zero (RAZ)

1–9

 

1.6.8

Should Be Zero (SBZ)

1–9

 

1.6.9

Ignore (IGN)

1–9

 

1.6.10

Implementation Dependent (IMP)

1–9

 

1.6.11

Illustration Conventions

1–9

 

1.6.12

Macro Code Example Conventions

1–9

2

Basic Architecture

 

 

2.1

Addressing

2–1

 

2.2

Data Types

2–1

 

2.2.1

Byte

2–1

 

2.2.2

Word

2–1

 

2.2.3

Longword

2–2

 

2.2.4

Quadword

2–2

 

2.2.5

VAX Floating-Point Formats

2–3

 

2.2.5.1

F_floating

2–3

 

2.2.5.2

G_floating

2–4

 

2.2.5.3

D_floating

2–5

 

2.2.6

IEEE Floating-Point Formats

2–6

 

2.2.6.1

S_Floating

2–7

 

2.2.6.2

T_floating

2–8

 

2.2.6.3

X_Floating

2–9

 

2.2.7

Longword Integer Format in Floating-Point Unit

2–11

 

2.2.8

Quadword Integer Format in Floating-Point Unit

2–12

 

2.2.9

Data Types with No Hardware Support

2–12

iii

Page 3
Image 3
Compaq ECQD2KCTE manual Table of Contents