Closed deanliberty5 closed 6 months ago
Thanks for the comments! Most of the feedback is now incorporated into the latest draft. Please find some additional replies below:
Chapter 1: In the sentence "If implemented in software, pointer masking still provides performance benefits since all non-checked accesses do not need to transform the address before every memory access.", are you just trying to say that Pointer Masking aids software based tag checking by alleviating software from removing the tag?
Yes, exactly.
Section 2.1, Transformed address: Append "to remove the masked bits" to the sentence.
They are not necessarily removed (since it is sign extension, they may be overwritten with 1's as well). I think defining this in terms of the ignore transformation may be clearer, although I have no strong opinion either way.
Section 2.3, Table 1, "Effective Address" should say "Virtual address with tag bits set".
I think both are correct, but in my view, saying effective address helps highlight further that the transformation is directly applied to the address produced by the instruction.
Suggested changes (mostly editorial):