2. This goes double when you ask where the addresses come from to begin with. Also memory? Now you have double-indirect memory accesses in your pipeline. Another complexity explosion, and one of the things that killed both VAX and the Motorola 68000.
-
-
So I'm just looking for a more in depth understanding of whether it's really the right idea to have n "phantom" addresses that don't actually map to anything as the core way that instruction streams are written...
-
... instead of some other potential scheme that still reflects the fact that these are special, just not necessarily "phantom".
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.