beautypg.com

6 cache data integrity – NEC Network Controller uPD98502 User Manual

Page 174

background image

CHAPTER 2 V

R

4120A

174

Preliminary User’s Manual S15543EJ1V0UM

2.7.6 Cache data integrity

Figures 2-72 to 2-86 shows checking operations for various cache accesses.

Figure 2-72. Data Check Flow on Instruction Fetch

Start

Data Fetch

END

Tag Check

Refill (See

Figure 2-85)

Hit

Miss

Figure 2-73. Data Check Flow on Load Operations

Start

Write-back and
Refill (see

Data Load to
Register

END

Hit

V = 0 (invalid)

or

W = 0 (clean)

Miss or
Invalid

V bit, W bit

V = 1 (valid) and
W = 1 (dirty)

Refill (see
Figure 2-85)

Tag Check

Figure 2-86)