Cache
6-13
18524C/0—Nov1996
AMD-K5 Processor Technical Reference Manual
entiate the function of an inquire cycle from the functions of
snoops and invalidations that work and/or are initiated in quite
different ways (see the preface for a short list of definitions).
For example, the AMD-K5 and Pentium processors support
only inquire cycles and internal snoops to their L1 cache. They
do not support continuous address bus watching.
The processor responds to inquire cycles by looking up the
inquire address in its physical tags. The physical-tag lookups
are done in parallel with the linear-tag lookups that support
program execution, so inquire cycles do not normally affect
processor performance. Even when inquire cycles hit modified
lines, which require writebacks to memory, only the proces-
sor’s use of the bus is potentially affected. It can normally con-
tinue to operate out of its cache during a writeback.
Inquire cycles are initiated with EADS, INV, and an inquire
address on A31–A5. In response, the processor asserts HIT if
the inquire cycle address matches the address of a valid line in
the instruction or data cache, or it asserts both HIT and HITM
if the address matches a modified line in the data cache. If
HITM is asserted, the processor writes the modified line back to
memory. If INV was asserted with EADS, a hit invalidates the
line. If INV was negated with EADS, a hit leaves the line in the
shared state, or transitions it from the modified to shared state.
On the AMD-K5 processor, the maximum inquire or invalida-
tion rate with inquire cycles is one every two clocks, because
HIT and HITM change state two clocks after EADS, and EADS
can be asserted in the same clock in which HITM is negated.
The MESI-state transitions for inquire cycles, internal snoops,
and cache invalidations are given in Table 2-3 on page 2-20 and
Table 5-11 on page 5-71.
System logic typically drives inquire cycles to the processor
during memory accesses by another bus master. If the proces-
sor has a look-through L2 cache, inquire cycles need be driven
to the processor only when a prior inquire cycle hits in the pro-
cessor’s L2 cache, or during line replacements in the proces-
sor’s L2 cache. To implement inquire cycles to the processor or
L2 cache for every memory access by another caching master,
system logic can generate EADS using the equivalent of ADS
from the other caching master.
Summary of Contents for AMD-K5
Page 1: ...AMD K5 Processor Technical Reference Manual TM...
Page 10: ...x AMD K5 Processor Technical Reference Manual 18524C 0 Nov1996...
Page 24: ...1 4 Overview AMD K5 Processor Technical Reference Manual 18524C 0 Nov1996...
Page 54: ...2 30 Internal Architecture AMD K5 Processor Technical Reference Manual 18524C 0 Nov1996...
Page 116: ...4 26 Performance AMD K5 Processor Technical Reference Manual 18524C 0 Nov1996...
Page 356: ...6 44 System Design AMD K5 Processor Technical Reference Manual 18524C 0 Nov1996...
Page 380: ...7 24 Test and Debug AMD K5 Processor Technical Reference Manual 18524C 0 Nov1996...
Page 396: ...A 16 AMD K5 Processor Technical Reference Manual 18524C 0 Nov1996...
Page 406: ...I 10 Index AMD K5 Processor Technical Reference Manual 18524C 0 Nov1996...