
11. Cache Organization, Operation, and Coherency

11.10 Manipulation of the Cache by an External Agent
Just as the processor accesses caches, so too can an external agent examine and manipulate the state and content of the primary and secondary caches through invalidate, update, snoop, and intervention transactions.
These transactions are described in the following sections. Encodings of these request transactions are given in Chapter 12.

Copyright 1996, MIPS Technologies, Inc. -- 21 MAR 96




Generated with CERN WebMaker
