呂紹樺
    • Create new note
    • Create a note from template
      • Sharing URL Link copied
      • /edit
      • View mode
        • Edit mode
        • View mode
        • Book mode
        • Slide mode
        Edit mode View mode Book mode Slide mode
      • Customize slides
      • Note Permission
      • Read
        • Only me
        • Signed-in users
        • Everyone
        Only me Signed-in users Everyone
      • Write
        • Only me
        • Signed-in users
        • Everyone
        Only me Signed-in users Everyone
      • Engagement control Commenting, Suggest edit, Emoji Reply
      • Invitee
    • Publish Note

      Share your work with the world Congratulations! 🎉 Your note is out in the world Publish Note

      Your note will be visible on your profile and discoverable by anyone.
      Your note is now live.
      This note is visible on your profile and discoverable online.
      Everyone on the web can find and read all notes of this public team.
      See published notes
      Unpublish note
      Please check the box to agree to the Community Guidelines.
      View profile
    • Commenting
      Permission
      Disabled Forbidden Owners Signed-in users Everyone
    • Enable
    • Permission
      • Forbidden
      • Owners
      • Signed-in users
      • Everyone
    • Suggest edit
      Permission
      Disabled Forbidden Owners Signed-in users Everyone
    • Enable
    • Permission
      • Forbidden
      • Owners
      • Signed-in users
    • Emoji Reply
    • Enable
    • Versions and GitHub Sync
    • Note settings
    • Engagement control
    • Transfer ownership
    • Delete this note
    • Save as template
    • Insert from template
    • Import from
      • Dropbox
      • Google Drive
      • Gist
      • Clipboard
    • Export to
      • Dropbox
      • Google Drive
      • Gist
    • Download
      • Markdown
      • HTML
      • Raw HTML
Menu Note settings Sharing URL Create Help
Create Create new note Create a note from template
Menu
Options
Versions and GitHub Sync Engagement control Transfer ownership Delete this note
Import from
Dropbox Google Drive Gist Clipboard
Export to
Dropbox Google Drive Gist
Download
Markdown HTML Raw HTML
Back
Sharing URL Link copied
/edit
View mode
  • Edit mode
  • View mode
  • Book mode
  • Slide mode
Edit mode View mode Book mode Slide mode
Customize slides
Note Permission
Read
Only me
  • Only me
  • Signed-in users
  • Everyone
Only me Signed-in users Everyone
Write
Only me
  • Only me
  • Signed-in users
  • Everyone
Only me Signed-in users Everyone
Engagement control Commenting, Suggest edit, Emoji Reply
Invitee
Publish Note

Share your work with the world Congratulations! 🎉 Your note is out in the world Publish Note

Your note will be visible on your profile and discoverable by anyone.
Your note is now live.
This note is visible on your profile and discoverable online.
Everyone on the web can find and read all notes of this public team.
See published notes
Unpublish note
Please check the box to agree to the Community Guidelines.
View profile
Engagement control
Commenting
Permission
Disabled Forbidden Owners Signed-in users Everyone
Enable
Permission
  • Forbidden
  • Owners
  • Signed-in users
  • Everyone
Suggest edit
Permission
Disabled Forbidden Owners Signed-in users Everyone
Enable
Permission
  • Forbidden
  • Owners
  • Signed-in users
Emoji Reply
Enable
Import from Dropbox Google Drive Gist Clipboard
   owned this note    owned this note      
Published Linked with GitHub
Subscribed
  • Any changes
    Be notified of any changes
  • Mention me
    Be notified of mention me
  • Unsubscribe
Subscribe
# Assignment1 RV32I Simulator ###### tags: `Computer Architecture` **Table of Contents** [TOC] About convolution --- In mathematics, convolution is a mathematical operation on two functions (f and g) that produces a third function expressing how the shape of one is modified by the other. It is also an important concept in the field of discrete-time signal processing. An example of LTI system is that an output signal y[n] can be calculated as a input signal x[n] convolve with an impulse response of the system h[n] : ![](https://i.imgur.com/A9Ws7SO.png) And it can also be abbreviated as follows : ![](https://i.imgur.com/unTS9e3.png) In this assignment, I'm going to implement a function of convolution sum which can convolve two finite-length integer sequences. To simplify the function, I restrict two integer sequences to be equal length. ![link text](https://i.imgur.com/pBNQ07R.png) Where A[], B[] : input integer array C[] : output integer array N+1 : length of A[], B[], C[] C code implementation --- There are two loops and one conditional branch(if-else) in this implementation. ```clike= #include<stdio.h> int main() { int A[5] = {10,12,31,17,25}; int B[5] = {3,8,78,91,71}; int N = 4; int C[5]; for(int i=0; i<N+1; i++) { for(int j=0; j<i+1; j++){ if(!j){ C[i] = A[j]*B[i-j]; }else{ C[i] = C[i]+(A[j]*B[i-j]); } } printf("C[%d] = %d\n", i, C[i]); } return 0; } ``` Assembly code implementation --- I convert C code to assembly code manually. The assembly code contains four functional parts. **1. Store arrays to memory** Initialize arrays and variable. **2. Loops** Indices i and j decide which values in arrays are going to participate the calculation. **3. else and then** j is 0 means that the multiply operation only has one term, so execute "C[i] = A[0]*B[i]". Otherwise, execute "C[i] = C[i]+A[0]*B[i]" to accumlate multiply operation to the result. **4. printResult** Environment calls are defined by Ripes simulator. Put the correspond value into a0 and a7 registers to activate particular system calls you want. ```clike= .data str1: .string "C[" str2: .string "]=" str3: .string "\n" # s0:address of A[] # s1:address of B[] # s2:address of C[] # t0:i # t1:j # t2:terminate value of loopi # t3:terminate value of loopj .text main: add s0, zero, zero # initialize the base address of A[] addi s1, s0, 20 # set the base address of B[] addi s2, s1, 20 # set the base address of C[] li t0, 10 # A[] = {10,12,31,17,25} sw t0, 0(s0) li t0, 12 sw t0, 4(s0) li t0, 31 sw t0, 8(s0) li t0, 17 sw t0, 12(s0) li t0, 25 sw t0, 16(s0) li t0, 3 # B[] = {3,8,78,91,71} sw t0, 0(s1) li t0, 8 sw t0, 4(s1) li t0, 78 sw t0, 8(s1) li t0, 91 sw t0, 12(s1) li t0, 71 sw t0, 16(s1) addi t0, zero, 0 # i=0 li t2, 4 addi t2, t2, 1 # t2=N+1 loopi: bge t0, t2, exit # if i>=N+1, then exit loop i addi t1, zero, 0 # j=0 loopj: addi t3, t0, 1 # t3=i+1 bge t1, t3, endi # if j>=i+1, then exit loop j beq t1, zero, then # if j==0,then C[i] = A[j]*B[i-j] else: slli t4, t1, 2 # t4=j*4 slli t5, t0, 2 # t5=i*4 sub t6, t5, t4 # t6=(i-j)*4 add s3, s2, t5 # s3=address of C[i] add s4, s1, t6 # s4=address of B[i-j] add s5, s0, t4 # s5=address of A[j] lw s6, 0(s5) # s6=A[i] lw s7, 0(s4) # s7=B[i-j] lw s9, 0(s3) # s9=C[i] mul t4, s6, s7 # t4=A[i]*B[i-j] add s9, s9, t4 # t5=C[i]+A[i]*B[i-j] sw s9, 0(s3) # C[i]=C[i]+A[i]*B[i-j] j endj # end of j loop then: slli t4, t1, 2 # t4=j*4 slli t5, t0, 2 # t5=i*4 sub t6, t5, t4 # t6=(i-j)*4 add s3, s2, t5 # s3=address of C[i] add s4, s1, t6 # s4=address of B[i-j] add s5, s0, t4 # s5=address of A[j] lw s6, 0(s5) # s6=A[i] lw s7, 0(s4) # s7=B[i-j] mul t4, s6, s7 # t4=A[i]*B[i-j] sw t4, 0(s3) # C[i]=A[i]*B[i-j] endj: addi t1, t1, 1 # j = j+1 j loopj endi: la a0, str1 # print string 'C[' li a7, 4 ecall mv a0, t0 # print integer i li a7, 1 ecall la a0, str2 # print string ']=' li a7, 4 ecall lw s8, 0(s3) # print integer C[i] mv a0, s8 li a7, 1 ecall la a0, str3 # print string '\n' li a7, 4 ecall addi t0, t0, 1 # i = i+1 j loopi exit: li a7, 10 # Halts the simulator ecall ``` Results --- Using Visual studio to execute the C code, the convolution sum of arrays A[] = {10,12,31,17,25} and B[] = {3,8,78,91,71} is array C[]. Each element in C[] is as follows: ![](https://i.imgur.com/Fe3Eeg3.png) Result of executing assembly code on Ripes is same as C code!:smile: ![](https://i.imgur.com/XyFqQ1A.png) How RSIC-V assembly code works on Ripes --- - **Store elements of array to memory** For example, the first integer to store to memory is 10. So the instruction "sw x5 0(s0)" store value 10 to the A[0] (register s0 stores the base address of A[]). ![](https://i.imgur.com/GXMvLzP.png) *** When instruction "sw x5 0(s0)" is at memory access stage, memory write will be enable by setting signal line "Wr en" to 1 (as the green dot in data memory below). ![](https://i.imgur.com/TeU7FWL.png) *** And the value of the first block of memory is 0x0000000a, which is 10 in decimal representation. ![](https://i.imgur.com/4OGthxC.png) *** After setup the A[] and B[] in memory, the memory looks like picture below, which A[] = {10,12,31,17,25} and B[] = {3,8,78,91,71} ![](https://i.imgur.com/w7IccHN.png) *** - **Loops** In the first i loop, when instruction "bge x5, x7, exit" is at the execution(EX) stage, the decision of whether to branch or not is made by ALU. ![](https://i.imgur.com/vDEFMRi.png) *** And the Ripes simulator automatically flushs the previous two stages to avoid branch harzard. ![](https://i.imgur.com/ImuYbcD.png) *** In next cycle, since value of register x5 is smaller than x7, branch will not be taken in this case, so the next instruction "bge x6, x28, endi" will come into pipeline. ![](https://i.imgur.com/MjTyf9G.png) ![](https://i.imgur.com/mIhFuOD.png) *** - **else and then** When the instruction "beq x6, x0, then" is at the execution stage(EX), the if-else branch decision in the loop j is made. ![](https://i.imgur.com/OYbSmOa.png) *** In this case, register x6 is equal to zero. Therefore, The program counter(PC) will be set to the address of the label "then" at the same time(as the green dot in the PC block). ![](https://i.imgur.com/NHCdy5p.png) *** In the next cycle, the next insruction will be fetched is "slli x29, x6, 2". That means when "if" condition is true, "then" condition is going to execute "slli x29, x6, 2" and its following instructions. ![](https://i.imgur.com/2umgV39.png) *** In the previous cycle, notice that there were two instructions already at the instrcution fetch(IF) and instruction decode(ID) stage respectively. They are "slli x29, x6, 2" and "slli x30, x5, 2". Now they must be flushed since the branch is taken. ![](https://i.imgur.com/blRC3mD.png) *** - **printResult** The instruction "ecall" will evoke OS to do the I/O stuff. In Ripes, you put the corresponding value into register a0 and a7 before "ecall" can help. In my code, I tried to print out integers and strings to the console. ![](https://i.imgur.com/OBjROWt.png) *** x86-64 vs RISC-V calling convention --- Here is an example reference to CS:App 3th edition: ```clike= //This is an example from CS:App 3th edition Fig 3.29 #include <stdio.h> #include <stdlib.h> int main(int argc, char *argv[]) { call_proc(); return 0; } long call_proc(){ long x1 = 1; int x2 = 2; short x3 = 3; char x4 = 4; proc(x1, &x1, x2, &x2, x3, &x3, x4, &x4); return (x1+x2)*(x3-x4); } void proc(long a1, long *a1p, int a2, int *a2p, short a3, short *a3p, char a4, char *a4p) { *a1p += a1; *a2p += a2; *a3p += a3; *a4p += a4; } ``` ### x86-64 calling convention We could generate an executable program as follows: ```clike= $ gcc -Og -o prog proc_call.c ``` We can disassemble the file prog: ```clike= $ objdump -d prog ``` The disassembler will extract various code sequences, including the following: ```clike= Disassembly of section .text: 0000000000001169 <proc>: 1169: f3 0f 1e fa endbr64 116d: 48 8b 44 24 10 mov 0x10(%rsp),%rax ## Load &x4 from stack to register %rax 1172: 48 01 3e add %rdi,(%rsi) ## Perform *x1p += x1; 1175: 01 11 add %edx,(%rcx) ## Perform *x2p += x2; 1177: 66 45 01 01 add %r8w,(%r9) ## Perform *x3p += x3; 117b: 8b 54 24 08 mov 0x8(%rsp),%edx ## Load x4 from stack to register %edx 117f: 00 10 add %dl,(%rax) ## Perform *x4p += x4; 1181: c3 retq 0000000000001182 <call_proc>: 1182: f3 0f 1e fa endbr64 1186: 53 push %rbx 1187: 48 83 ec 20 sub $0x20,%rsp ## Allocate 20 bytes stack frame 118b: bb 28 00 00 00 mov $0x28,%ebx 1190: 64 48 8b 03 mov %fs:(%rbx),%rax ## Rerieve canary 1194: 48 89 44 24 18 mov %rax,0x18(%rsp) ## Store on stack 1199: 31 c0 xor %eax,%eax ## Zero out register 119b: 48 c7 44 24 10 01 00 movq $0x1,0x10(%rsp) ## Save long x1 to stack for getting &x1 11a2: 00 00 11a4: c7 44 24 0c 02 00 00 movl $0x2,0xc(%rsp) ## Save int x2 to stack for getting &x2 11ab: 00 11ac: 66 c7 44 24 0a 03 00 movw $0x3,0xa(%rsp) ## Save short x3 to stack for getting &x3 11b3: c6 44 24 09 04 movb $0x4,0x9(%rsp) ## Save char x4 to stack for getting &x4 11b8: 48 8d 4c 24 0c lea 0xc(%rsp),%rcx ## Let register %rcx hold address &x2 11bd: 48 8d 74 24 10 lea 0x10(%rsp),%rsi ## Let register %rsi hold address &x1 11c2: 48 8d 44 24 09 lea 0x9(%rsp),%rax ## Let register %rax hold address &x4 11c7: 50 push %rax ## Spilling register argument &x4 need to be store on stack 11c8: 6a 04 pushq $0x4 ## Spilling register argument x4 need to be store on stack 11ca: 4c 8d 4c 24 1a lea 0x1a(%rsp),%r9 ## Let register %r9 hold address &x4 11cf: 41 b8 03 00 00 00 mov $0x3,%r8d ## Pass 3 as argument 11d5: ba 02 00 00 00 mov $0x2,%edx ## Pass 2 as argument 11da: bf 01 00 00 00 mov $0x1,%edi ## Pass 1 as argument 11df: e8 85 ff ff ff callq 1169 <proc> ## Call procedure proc() 11e4: 48 63 4c 24 1c movslq 0x1c(%rsp),%rcx 11e9: 48 03 4c 24 20 add 0x20(%rsp),%rcx 11ee: 0f bf 54 24 1a movswl 0x1a(%rsp),%edx 11f3: 0f be 44 24 19 movsbl 0x19(%rsp),%eax 11f8: 29 c2 sub %eax,%edx 11fa: 48 63 c2 movslq %edx,%rax 11fd: 48 0f af c1 imul %rcx,%rax 1201: 48 83 c4 10 add $0x10,%rsp 1205: 48 8b 7c 24 18 mov 0x18(%rsp),%rdi 120a: 64 48 33 3b xor %fs:(%rbx),%rdi 120e: 75 06 jne 1216 <call_proc+0x94> 1210: 48 83 c4 20 add $0x20,%rsp 1214: 5b pop %rbx 1215: c3 retq 1216: e8 45 fe ff ff callq 1060 <__stack_chk_fail@plt> 000000000000121b <main>: 121b: f3 0f 1e fa endbr64 121f: 48 83 ec 08 sub $0x8,%rsp 1223: b8 00 00 00 00 mov $0x0,%eax 1228: e8 55 ff ff ff callq 1182 <call_proc> 122d: 48 89 c2 mov %rax,%rdx 1230: 48 8d 35 cd 0d 00 00 lea 0xdcd(%rip),%rsi # 2004 <_IO_stdin_used+0x4> 1237: bf 01 00 00 00 mov $0x1,%edi 123c: b8 00 00 00 00 mov $0x0,%eax 1241: e8 2a fe ff ff callq 1070 <__printf_chk@plt> 1246: b8 00 00 00 00 mov $0x0,%eax 124b: 48 83 c4 08 add $0x8,%rsp 124f: c3 retq ``` ### RISC-V calling convention Since we are not using standard library for this case, the program should be modified as follow: ```clike= // Modified to fit RISC-V compiler // Some operators are changed for the purpose of convenience long call_proc(); void proc( long, long *, int, int*, short, short*, char, char *); void _start() { volatile char* tx = (volatile char*) 0x40002000; const char *str1 = "The result is:"; long *p, result = call_proc(); //printf("The result is: %ld\n", result); p = &result; *tx = *p + '0'; } long call_proc(){ long x1 = 1; int x2 = 2; short x3 = 3; char x4 = 4; proc(x1, &x1, x2, &x2, x3, &x3, x4, &x4); return (x1+x2)+(x3-x4); } void proc(long a1, long *a1p, int a2, int *a2p, short a3, short *a3p, char a4, char *a4p) { *a1p += a1; *a2p += a2; *a3p += a3; *a4p += a4; } ``` We could generate an executable program as follows: ``` $ riscv-none-embed-gcc -march=rv32i -mabi=ilp32 -Og -nostdlib proc_call.c -o proc_call ``` We can disassemble the file prog: ``` $ riscv-none-embed-objdump -d proc_call ``` The disassembler will extract various code sequences, including the following: ```clike= 00010074 <proc>: 10074: 0005a303 lw t1,0(a1) 10078: 00a30333 add t1,t1,a0 1007c: 0065a023 sw t1,0(a1) ## *a1p += a1; 10080: 0006a583 lw a1,0(a3) 10084: 00c585b3 add a1,a1,a2 10088: 00b6a023 sw a1,0(a3) ## *a2p += a2; 1008c: 0007d683 lhu a3,0(a5) 10090: 00d70733 add a4,a4,a3 10094: 00e79023 sh a4,0(a5) ## *a3p += a3; 10098: 0008c783 lbu a5,0(a7) 1009c: 00f80833 add a6,a6,a5 100a0: 01088023 sb a6,0(a7) ## *a4p += a4; 100a4: 00008067 ret 000100a8 <call_proc>: 100a8: fe010113 addi sp,sp,-32 ## Allocate 32 byte stack frame 100ac: 00112e23 sw ra,28(sp) ## Store return address 100b0: 00100793 li a5,1 100b4: 00f12623 sw a5,12(sp) ## Immediates must be put on stack first 100b8: 00200793 li a5,2 100bc: 00f12423 sw a5,8(sp) 100c0: 00300793 li a5,3 100c4: 00f11323 sh a5,6(sp) 100c8: 00400793 li a5,4 100cc: 00f102a3 sb a5,5(sp) 100d0: 00510893 addi a7,sp,5 ## Load the address of immediates &x1, &x2, &x3, &x4 to registers a7, a5, a3, a1 respectively 100d4: 00400813 li a6,4 ## Load the immediate to registers a0, a2, a4, a6 100d8: 00610793 addi a5,sp,6 100dc: 00300713 li a4,3 100e0: 00810693 addi a3,sp,8 100e4: 00200613 li a2,2 100e8: 00c10593 addi a1,sp,12 100ec: 00100513 li a0,1 100f0: f85ff0ef jal ra,10074 <proc> ## Call proc() 100f4: 00c12503 lw a0,12(sp) 100f8: 00812783 lw a5,8(sp) 100fc: 00f50533 add a0,a0,a5 10100: 00611783 lh a5,6(sp) 10104: 00514703 lbu a4,5(sp) 10108: 40e787b3 sub a5,a5,a4 1010c: 00f50533 add a0,a0,a5 10110: 01c12083 lw ra,28(sp) 10114: 02010113 addi sp,sp,32 10118: 00008067 ret 0001011c <_start>: 1011c: ff010113 addi sp,sp,-16 10120: 00112623 sw ra,12(sp) 10124: f85ff0ef jal ra,100a8 <call_proc> 10128: 03050513 addi a0,a0,48 1012c: 0ff57513 zext.b a0,a0 10130: 400027b7 lui a5,0x40002 10134: 00a78023 sb a0,0(a5) # 40002000 <__global_pointer$+0x3fff06b0> 10138: 00c12083 lw ra,12(sp) 1013c: 01010113 addi sp,sp,16 10140: 00008067 ret ``` In terms of RISC-V assembly, we can see that there aren't any spilling register in this example. The arguments can be put in a0-a7 and then call procedure `proc()`. But the number of lines in RISC-V assembly is more than that of x86-64. One of the reason is that the arithemtic and logical opertations in RISC-V only use register operands but not memory operands.

Import from clipboard

Paste your markdown or webpage here...

Advanced permission required

Your current role can only read. Ask the system administrator to acquire write and comment permission.

This team is disabled

Sorry, this team is disabled. You can't edit this note.

This note is locked

Sorry, only owner can edit this note.

Reach the limit

Sorry, you've reached the max length this note can be.
Please reduce the content or divide it to more notes, thank you!

Import from Gist

Import from Snippet

or

Export to Snippet

Are you sure?

Do you really want to delete this note?
All users will lose their connection.

Create a note from template

Create a note from template

Oops...
This template has been removed or transferred.
Upgrade
All
  • All
  • Team
No template.

Create a template

Upgrade

Delete template

Do you really want to delete this template?
Turn this template into a regular note and keep its content, versions, and comments.

This page need refresh

You have an incompatible client version.
Refresh to update.
New version available!
See releases notes here
Refresh to enjoy new features.
Your user state has changed.
Refresh to load new user state.

Sign in

Forgot password

or

By clicking below, you agree to our terms of service.

Sign in via Facebook Sign in via Twitter Sign in via GitHub Sign in via Dropbox Sign in with Wallet
Wallet ( )
Connect another wallet

New to HackMD? Sign up

Help

  • English
  • 中文
  • Français
  • Deutsch
  • 日本語
  • Español
  • Català
  • Ελληνικά
  • Português
  • italiano
  • Türkçe
  • Русский
  • Nederlands
  • hrvatski jezik
  • język polski
  • Українська
  • हिन्दी
  • svenska
  • Esperanto
  • dansk

Documents

Help & Tutorial

How to use Book mode

Slide Example

API Docs

Edit in VSCode

Install browser extension

Contacts

Feedback

Discord

Send us email

Resources

Releases

Pricing

Blog

Policy

Terms

Privacy

Cheatsheet

Syntax Example Reference
# Header Header 基本排版
- Unordered List
  • Unordered List
1. Ordered List
  1. Ordered List
- [ ] Todo List
  • Todo List
> Blockquote
Blockquote
**Bold font** Bold font
*Italics font* Italics font
~~Strikethrough~~ Strikethrough
19^th^ 19th
H~2~O H2O
++Inserted text++ Inserted text
==Marked text== Marked text
[link text](https:// "title") Link
![image alt](https:// "title") Image
`Code` Code 在筆記中貼入程式碼
```javascript
var i = 0;
```
var i = 0;
:smile: :smile: Emoji list
{%youtube youtube_id %} Externals
$L^aT_eX$ LaTeX
:::info
This is a alert area.
:::

This is a alert area.

Versions and GitHub Sync
Get Full History Access

  • Edit version name
  • Delete

revision author avatar     named on  

More Less

Note content is identical to the latest version.
Compare
    Choose a version
    No search result
    Version not found
Sign in to link this note to GitHub
Learn more
This note is not linked with GitHub
 

Feedback

Submission failed, please try again

Thanks for your support.

On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?

Please give us some advice and help us improve HackMD.

 

Thanks for your feedback

Remove version name

Do you want to remove this version name and description?

Transfer ownership

Transfer to
    Warning: is a public team. If you transfer note to this team, everyone on the web can find and read this note.

      Link with GitHub

      Please authorize HackMD on GitHub
      • Please sign in to GitHub and install the HackMD app on your GitHub repo.
      • HackMD links with GitHub through a GitHub App. You can choose which repo to install our App.
      Learn more  Sign in to GitHub

      Push the note to GitHub Push to GitHub Pull a file from GitHub

        Authorize again
       

      Choose which file to push to

      Select repo
      Refresh Authorize more repos
      Select branch
      Select file
      Select branch
      Choose version(s) to push
      • Save a new version and push
      • Choose from existing versions
      Include title and tags
      Available push count

      Pull from GitHub

       
      File from GitHub
      File from HackMD

      GitHub Link Settings

      File linked

      Linked by
      File path
      Last synced branch
      Available push count

      Danger Zone

      Unlink
      You will no longer receive notification when GitHub file changes after unlink.

      Syncing

      Push failed

      Push successfully