logo资料库

AXI4_specification.pdf

第1页 / 共306页
第2页 / 共306页
第3页 / 共306页
第4页 / 共306页
第5页 / 共306页
第6页 / 共306页
第7页 / 共306页
第8页 / 共306页
资料共306页,剩余部分请下载后查看
AMBA AXI and ACE Protocol Specification AXI3, AXI4, and AXI4-Lite ACE and ACE-Lite
Contents
Preface
About this specification
Intended audience
Using this specification
Part A, AMBA AXI3 and AXI4 Protocol Specification
Part B, AMBA AXI4-Lite Interface Specification
Part C, ACE Protocol Specification
Part D, Appendices
Conventions
Typographic conventions
Timing diagrams
Signals
Numbers
Additional reading
ARM publications
Feedback
Feedback on this specification
Part A: AMBA AXI3 and AXI4 Protocol Specification
A1: Introduction
A1.1 About the AXI protocol
A1.2 AXI revisions
A1.3 AXI Architecture
A1.3.1 Channel definition
A1.3.2 Interface and interconnect
A1.3.3 Register slices
A1.4 Terminology
A1.4.1 AXI components and topology
A1.4.2 AXI transactions, and memory types
A1.4.3 Caches and cache operation
A1.4.4 Temporal description
A2: Signal Descriptions
A2.1 Global signals
A2.2 Write address channel signals
A2.3 Write data channel signals
A2.4 Write response channel signals
A2.5 Read address channel signals
A2.6 Read data channel signals
A2.7 Low-power interface signals
A3: Single Interface Requirements
A3.1 Clock and reset
A3.1.1 Clock
A3.1.2 Reset
A3.2 Basic read and write transactions
A3.2.1 Handshake process
A3.2.2 Channel signaling requirements
A3.3 Relationships between the channels
A3.3.1 Dependencies between channel handshake signals
A3.3.2 Legacy considerations
A3.4 Transaction structure
A3.4.1 Address structure
A3.4.2 Pseudocode description of the transfers
A3.4.3 Data read and write structure
A3.4.4 Read and write response structure
A4: Transaction Attributes
A4.1 Transaction types and attributes
A4.2 AXI3 memory attribute signaling
A4.3 AXI4 changes to memory attribute signaling
A4.3.1 AxCACHE[1], Modifiable
A4.3.2 Ordering requirements for Non-modifiable transactions
A4.3.3 Updated meaning of Read-allocate and Write-allocate
A4.4 Memory types
A4.4.1 Memory type requirements
A4.5 Mismatched memory attributes
A4.5.1 Changing memory attributes
A4.6 Transaction buffering
A4.7 Access permissions
A4.8 Legacy considerations
A4.9 Usage examples
A4.9.1 Use of Device memory types
A5: Multiple Transactions
A5.1 AXI transaction identifiers
A5.2 Transaction ID
A5.3 Transaction ordering
A5.3.1 Read ordering
A5.3.2 Normal write ordering
A5.3.3 AXI3 write data interleaving
A5.3.4 Read and write interaction
A5.3.5 Interconnect use of transaction identifiers
A5.3.6 Width of transaction ID fields
A5.4 Removal of write interleaving support
A5.4.1 Removal of WID
A5.4.2 Legacy considerations
A6: AXI4 Ordering Model
A6.1 Definition of the ordering model
A6.2 Master ordering
A6.3 Interconnect ordering
A6.4 Slave ordering
A6.5 Response before final destination
A7: Atomic Accesses
A7.1 Single-copy atomicity size
A7.2 Exclusive accesses
A7.2.1 Exclusive access process
A7.2.2 Exclusive access from the perspective of the master
A7.2.3 Exclusive access from the perspective of the slave
A7.2.4 Exclusive access restrictions
A7.2.5 Slaves that do not support exclusive access
A7.3 Locked accesses
A7.4 Atomic access signaling
A7.4.1 Legacy considerations
A8: AXI4 Additional Signaling
A8.1 QoS signaling
A8.1.1 QoS interface signals
A8.1.2 Master considerations
A8.1.3 System considerations
A8.2 Multiple region signaling
A8.2.1 Additional interface signals
A8.3 User-defined signaling
A8.3.1 Signal naming
A8.3.2 Usage considerations
A9: Low-power Interface
A9.1 About the low-power interface
A9.2 Low-power clock control
A9.2.1 Peripheral clock required
A9.2.2 Power-down or power-up handshake
A9.2.3 Acceptance of low-power request
A9.2.4 Denial of a low-power request
A9.2.5 Exiting a low-power state
A9.2.6 Clock control sequence summary
A9.2.7 Combining peripherals in a low-power domain
A10: Default Signaling and Interoperability
A10.1 Interoperability principles
A10.2 Major interface categories
A10.2.1 Read/write interface
A10.2.2 Read-only interface
A10.2.3 Write-only interface
A10.2.4 Memory slaves and peripheral slaves
A10.3 Default signal values
A10.3.1 Master addresses
A10.3.2 Slave addresses
A10.3.3 Memory slaves
A10.3.4 Write transactions
A10.3.5 Read transactions
A10.3.6 Response signaling
A10.3.7 Non-secure and secure accesses
Part B: AMBA AXI4-Lite Interface Specification
B1: AMBA AXI4-Lite
B1.1 Definition of AXI4-Lite
B1.1.1 Signal list
B1.1.2 Bus width
B1.1.3 Write strobes
B1.1.4 Optional signaling
B1.2 Interoperability
B1.2.1 Bridge requirements of AXI4-Lite slaves
B1.2.2 Direct connection requirements of AXI4-Lite slaves
B1.3 Defined conversion mechanism
B1.3.1 Conversion rules
B1.4 Conversion, protection, and detection
B1.4.1 Conversion and protection levels
B1.4.2 Implementation considerations
Part C: ACE Protocol Specification
C1: About ACE
C1.1 Coherency overview
C1.1.1 Usage cases
C1.1.2 ACE terminology
C1.2 Protocol overview
C1.2.1 About the ACE protocol
C1.2.2 Coherency model
C1.2.3 Cache state model
C1.3 Channel overview
C1.3.1 Changes to existing AXI4 channels
C1.3.2 Additional channels defined by ACE
C1.3.3 Acknowledge signaling
C1.3.4 Channel usage examples
C1.4 Transaction overview
C1.4.1 Non-snooping transactions
C1.4.2 Coherent transactions
C1.4.3 Memory update transactions
C1.4.4 Cache maintenance transactions
C1.4.5 Snoop transactions
C1.4.6 Barrier transactions
C1.4.7 Distributed virtual memory transactions
C1.5 Transaction processing
C1.6 Concepts required for the ACE specification
C1.6.1 Domains
C1.6.2 Barriers
C1.6.3 Distributed Virtual Memory
C1.7 Protocol errors
C1.7.1 Software protocol error
C1.7.2 Hardware protocol error
C2: Signal Descriptions
C2.1 Changes to existing AXI4 channels
C2.1.1 Read address channel (AR) signals
C2.1.2 Write address channel (AW) signals
C2.1.3 Read data channel (R) signals
C2.2 Additional channels defined by ACE
C2.2.1 Snoop address channel (AC) signals
C2.2.2 Snoop response channel (CR) signals
C2.2.3 Snoop data channel (CD) signals
C2.3 Additional response signals and signaling requirements defined by ACE
C2.3.1 Read acknowledge signal
C2.3.2 Write acknowledge signal
C2.3.3 Additional reset requirements
C3: Channel Signaling
C3.1 Read and write address channel signaling
C3.1.1 Shareability domain types
C3.1.2 Read and write barrier transactions
C3.1.3 Read and write shareable transaction types
C3.1.4 Cache line size restrictions
C3.1.5 Transaction constraints
C3.2 Read data channel signaling
C3.2.1 Read response signaling
C3.3 Read acknowledge signaling
C3.4 Write response channel signaling
C3.5 Write Acknowledge signaling
C3.6 Snoop address channel signaling
C3.6.1 About the snoop address channel
C3.6.2 Snoop address channel signaling
C3.7 Snoop response channel signaling
C3.8 Snoop data channel signaling
C3.9 Snoop channel dependencies
C4: Coherency Transactions on the Read Address and Write Address Channels
C4.1 About an initiating master
C4.1.1 Transaction groups
C4.2 About snoop filtering
C4.3 State changes on different transactions
C4.3.1 State changes associated with a load
C4.3.2 State changes associated with a coherent store
C4.3.3 State changes associated with a main memory update
C4.3.4 State changes associated with cache maintenance operations
C4.4 State change descriptions
C4.5 Read transactions
C4.5.1 ReadNoSnoop
C4.5.2 ReadOnce
C4.5.3 ReadClean
C4.5.4 ReadNotSharedDirty
C4.5.5 ReadShared
C4.5.6 ReadUnique
C4.6 Clean transactions
C4.6.1 CleanUnique
C4.6.2 CleanShared
C4.6.3 CleanInvalid
C4.7 Make transactions
C4.7.1 MakeUnique
C4.7.2 MakeInvalid
C4.8 Write transactions
C4.8.1 WriteNoSnoop
C4.8.2 WriteUnique
C4.8.3 WriteLineUnique
C4.8.4 WriteBack
C4.8.5 WriteClean
C4.8.6 Restrictions on WriteUnique and WriteLineUnique Usage
C4.9 Evict transactions
C4.9.1 Evict
C4.10 Handling overlapping write transactions
C4.10.1 Overlapping ReadUnique
C4.10.2 Overlapping MakeUnique
C4.10.3 Overlapping CleanUnique
C5: Snoop Transactions
C5.1 Mapping coherency operations to snoop operations
C5.1.1 Permitted snoop transactions
C5.1.2 Transactions not permitted as snoop transactions
C5.1.3 Alternative snoop transactions
C5.2 General requirements for snoop transactions
C5.2.1 Channel activity
C5.2.2 Snoop data transfers
C5.2.3 Memory update in progress
C5.2.4 WasUnique snoop response
C5.2.5 Non-blocking requirements for a snooped master
C5.3 Snoop transactions
C5.3.1 ReadOnce
C5.3.2 ReadClean, ReadShared, and ReadNotSharedDirty
C5.3.3 ReadUnique
C5.3.4 CleanInvalid
C5.3.5 MakeInvalid
C5.3.6 CleanShared
C6: Interconnect Requirements
C6.1 About the interconnect requirements
C6.2 Sequencing transactions
C6.2.1 Read and Write Acknowledge
C6.3 Issuing snoop transactions
C6.4 Transaction responses from the interconnect
C6.5 Interactions with main memory
C6.5.1 Interconnect read from main memory or peripheral device
C6.5.2 Main memory update generated by the interconnect
C6.5.3 Permission to update main memory
C6.6 Other requirements
C6.6.1 Non-blocking requirements
C6.6.2 Permitted transaction modifications
C6.6.3 Speculative reads
C6.7 Interoperability considerations
C6.7.1 Cache Line size conversions
C6.7.2 Additional Cache Line conversion considerations
C6.7.3 Address space size
C7: Cache Maintenance
C7.1 ARCACHE and ARDOMAIN requirements
C7.2 Other cache maintenance considerations
C7.2.1 Broadcast cache maintenance requirements
C7.2.2 Requirements for a snooped master
C7.2.3 Processor cache maintenance instructions
C7.2.4 Unpredictable behavior with software cache maintenance
C7.2.5 Mismatched shareability and cacheability
C8: Barrier Transactions
C8.1 About barrier transactions
C8.2 Barrier transaction signaling
C8.2.1 AxBAR signaling
C8.2.2 AxDOMAIN signaling
C8.2.3 Response signaling
C8.3 Barrier responses and domain boundaries
C8.4 Barrier requirements
C8.4.1 Master requirements
C8.4.2 Slave requirements
C8.4.3 Interconnect requirements
C8.4.4 Barriers and Device transaction ordering
C8.4.5 Multi-copy atomicity requirements for shareable locations
C9: Exclusive Accesses
C9.1 About Exclusive accesses
C9.2 Role of the master
C9.2.1 Exclusive Load
C9.2.2 Exclusive Load to Exclusive Store
C9.2.3 Exclusive Store
C9.3 Role of the interconnect
C9.3.1 Minimum PoS Exclusive Monitor
C9.3.2 Additional address comparison
C9.3.3 Multiple interconnect PoS monitors
C9.3.4 PoS Exclusive Monitor behavior
C9.4 Multiple Exclusive Threads
C9.5 Exclusive Accesses from AXI components
C9.6 Transaction requirements
C10: Optional External Snoop Filtering
C10.1 About external snoop filtering
C10.2 Master requirements to support snoop filters
C10.3 External snoop filter requirements
C11: ACE-Lite
C11.1 About ACE-Lite
C11.2 ACE-Lite signal requirements
C12: Distributed Virtual Memory Transactions
C12.1 About DVM transactions
C12.2 Synchronization message
C12.3 DVM transaction process and rules
C12.3.1 DVM Operation process
C12.3.2 DVM Sync and DVM Complete transactions
C12.3.3 Multi-part DVM Operation transactions
C12.3.4 Transaction response
C12.3.5 Message ID
C12.3.6 Instruction cache invalidation alternatives
C12.4 Physical and virtual address space size
C12.4.1 Physical address space size matches virtual address space size
C12.4.2 Physical address space size exceeds virtual address space size
C12.4.3 Virtual address space exceeds physical address space
C12.5 DVM transactions format
C12.6 DVM transaction restrictions
C12.7 DVM Operations
C12.7.1 TLB Invalidate
C12.7.2 Branch Predictor Invalidate
C12.7.3 Physical Instruction Cache Invalidate
C12.7.4 Virtual Instruction Cache Invalidate
C12.7.5 Synchronization
C12.7.6 Hint
C13: Interface Control
C13.1 About the interface control signals
Part D: Appendices
A: Revisions
Glossary
AMBA® AXI™ and ACE™ Protocol Specification AXI3™, AXI4™, and AXI4-Lite™ ACE and ACE-Lite™ Copyright © 2003, 2004, 2010, 2011 ARM. All rights reserved. ARM IHI 0022D (ID102711)
AMBA AXI and ACE Protocol Specification AXI3, AXI4, and AXI4-Lite ACE and ACE-Lite Copyright © 2003, 2004, 2010, 2011 ARM. All rights reserved. Release Information The following changes have been made to this specification. Change history Date Issue Confidentiality 16 June 2003 19 March 2004 03 March 2010 A B C Non-Confidential Non-Confidential Non-Confidential Change First release First release of AXI specification v1.0 First release of AXI specification v2.0 03 June 2011 D-2c Non-Confidential Public beta draft of AMBA AXI and ACE Protocol Specification 28 October 2011 D Non-Confidential First release of AMBA AXI and ACE Protocol Specification Issues B and C of this document included an AXI specification version, v1.0 and v2.0. These version number have been discontinued, to remove confusion with the AXI versions, AXI3 and AXI4. Proprietary Notice Words and logos marked with or are registered trademarks or trademarks of ARM in the EU and other countries, except as otherwise stated below in this proprietary notice. Other brands and names mentioned herein may be the trademarks of their respective owners. Neither the whole nor any part of the information contained in, or the product described in, this document may be adapted or reproduced in any material form except with the prior written permission of the copyright holder. The product described in this document is subject to continuous developments and improvements. All particulars of the product and its use contained in this document are given by ARM in good faith. However, all warranties implied or expressed, including but not limited to implied warranties of merchantability, or fitness for purpose, are excluded. This document is intended only to assist the reader in the use of the product. ARM shall not be liable for any loss or damage arising from the use of any information in this document, or any error or omission in such information, or any incorrect use of the product. Where the term ARM is used it means “ARM or any of its subsidiaries as appropriate”. ARM AMBA SPECIFICATION LICENCE THIS END USER LICENCE AGREEMENT (“LICENCE”) IS A LEGAL AGREEMENT BETWEEN YOU (EITHER A SINGLE INDIVIDUAL, OR SINGLE LEGAL ENTITY) AND ARM LIMITED (“ARM”) FOR THE USE OF THE RELEVANT AMBA SPECIFICATION ACCOMPANYING THIS LICENCE. ARM IS ONLY WILLING TO LICENSE THE RELEVANT AMBA SPECIFICATION TO YOU ON CONDITION THAT YOU ACCEPT ALL OF THE TERMS IN THIS LICENCE. BY CLICKING “I AGREE” OR OTHERWISE USING OR COPYING THE RELEVANT AMBA SPECIFICATION YOU INDICATE THAT YOU AGREE TO BE BOUND BY ALL THE TERMS OF THIS LICENCE. IF YOU DO NOT AGREE TO THE TERMS OF THIS LICENCE, ARM IS UNWILLING TO LICENSE THE RELEVANT AMBA SPECIFICATION TO YOU AND YOU MAY NOT USE OR COPY THE RELEVANT AMBA SPECIFICATION AND YOU SHOULD PROMPTLY RETURN THE RELEVANT AMBA SPECIFICATION TO ARM. “LICENSEE” means You and your Subsidiaries. “Subsidiary” means, if You are a single entity, any company the majority of whose voting shares is now or hereafter owned or controlled, directly or indirectly, by You. A company shall be a Subsidiary only for the period during which such control exists. 1. Subject to the provisions of Clauses 2, 3 and 4, ARM hereby grants to LICENSEE a perpetual, non-exclusive, non-transferable, royalty free, worldwide licence to: (i) use and copy the relevant AMBA Specification for the purpose of developing and having developed products that comply with the relevant AMBA Specification; ii Copyright © 2003, 2004, 2010, 2011 ARM. All rights reserved. Non-Confidential ARM IHI 0022D ID102711
(ii) manufacture and have manufactured products which either: (a) have been created by or for LICENSEE under the licence granted in Clause 1(i); or (b) incorporate a product(s) which has been created by a third party(s) under a licence granted by ARM in Clause 1(i) of such third party’s ARM AMBA Specification Licence; and (iii) offer to sell, sell, supply or otherwise distribute products which have either been (a) created by or for LICENSEE under the licence granted in Clause 1(i); or (b) manufactured by or for LICENSEE under the licence granted in Clause 1(ii). 2. LICENSEE hereby agrees that the licence granted in Clause 1 is subject to the following restrictions: (i) where a product created under Clause 1(i) is an integrated circuit which includes a CPU then either: (a) such CPU shall only be manufactured under licence from ARM; or (b) such CPU is neither substantially compliant with nor marketed as being compliant with the ARM instruction sets licensed by ARM from time to time; (ii) the licences granted in Clause 1(iii) shall not extend to any portion or function of a product that is not itself compliant with part of the relevant AMBA Specification; and (iii) no right is granted to LICENSEE to sublicense the rights granted to LICENSEE under this Agreement. 3. Except as specifically licensed in accordance with Clause 1, LICENSEE acquires no right, title or interest in any ARM technology or any intellectual property embodied therein. In no event shall the licences granted in accordance with Clause 1 be construed as granting LICENSEE, expressly or by implication, estoppel or otherwise, a licence to use any ARM technology except the relevant AMBA Specification. 4. THE RELEVANT AMBA SPECIFICATION IS PROVIDED “AS IS” WITH NO WARRANTIES EXPRESS, IMPLIED OR STATUTORY, INCLUDING BUT NOT LIMITED TO ANY WARRANTY OF SATISFACTORY QUALITY, MERCHANTABILITY, NONINFRINGEMENT OR FITNESS FOR A PARTICULAR PURPOSE. 5. No licence, express, implied or otherwise, is granted to LICENSEE, under the provisions of Clause 1, to use the ARM tradename, or AMBA trademark in connection with the relevant AMBA Specification or any products based thereon. Nothing in Clause 1 shall be construed as authority for LICENSEE to make any representations on behalf of ARM in respect of the relevant AMBA Specification. 6. This Licence shall remain in force until terminated by you or by ARM. Without prejudice to any of its other rights if LICENSEE is in breach of any of the terms and conditions of this Licence then ARM may terminate this Licence immediately upon giving written notice to You. You may terminate this Licence at any time. Upon expiry or termination of this Licence by You or by ARM LICENSEE shall stop using the relevant AMBA Specification and destroy all copies of the relevant AMBA Specification in your possession together with all documentation and related materials. Upon expiry or termination of this Licence, the provisions of clauses 6 and 7 shall survive. 7. The validity, construction and performance of this Agreement shall be governed by English Law. ARM contract references: LEC-PRE-00490-V4.0 ARM AMBA Specification Licence. Confidentiality Status This document is Non-Confidential. The right to use, copy and disclose this document may be subject to license restrictions in accordance with the terms of the agreement entered into by ARM and the party that ARM delivered this document to. Product Status The information in this document is final, that is for a developed product. Web Address http://www.arm.com ARM IHI 0022D ID102711 Copyright © 2003, 2004, 2010, 2011 ARM. All rights reserved. Non-Confidential iii
iv Copyright © 2003, 2004, 2010, 2011 ARM. All rights reserved. Non-Confidential ARM IHI 0022D ID102711
Contents AMBA AXI and ACE Protocol Specification AXI3, AXI4, and AXI4-Lite ACE and ACE-Lite Part A Chapter A1 Chapter A2 Preface About this specification ................................................................................................ x Using this specification ............................................................................................... xi Conventions .............................................................................................................. xiii Additional reading ...................................................................................................... xv Feedback .................................................................................................................. xvi AMBA AXI3 and AXI4 Protocol Specification Introduction A1.1 A1.2 A1.3 A1.4 About the AXI protocol ......................................................................................... A1-20 AXI revisions ........................................................................................................ A1-21 AXI Architecture ................................................................................................... A1-22 Terminology ......................................................................................................... A1-25 Signal Descriptions A2.1 Global signals ...................................................................................................... A2-28 A2.2 Write address channel signals ............................................................................. A2-29 A2.3 Write data channel signals ................................................................................... A2-30 A2.4 Write response channel signals ........................................................................... A2-31 Read address channel signals ............................................................................. A2-32 A2.5 Read data channel signals ................................................................................... A2-33 A2.6 A2.7 Low-power interface signals ................................................................................ A2-34 ARM IHI 0022D ID102711 Copyright © 2003, 2004, 2010, 2011 ARM. All rights reserved. Non-Confidential v
Contents Chapter A3 Chapter A4 Chapter A5 Chapter A6 Chapter A7 Chapter A8 Chapter A9 Chapter A10 Part B Chapter B1 Single Interface Requirements A3.1 A3.2 A3.3 A3.4 Clock and reset ................................................................................................... A3-36 Basic read and write transactions ....................................................................... A3-37 Relationships between the channels ................................................................... A3-40 Transaction structure ........................................................................................... A3-44 Transaction Attributes A4.1 A4.2 A4.3 A4.4 A4.5 A4.6 A4.7 A4.8 A4.9 Transaction types and attributes ......................................................................... A4-58 AXI3 memory attribute signaling ......................................................................... A4-59 AXI4 changes to memory attribute signaling ....................................................... A4-60 Memory types ...................................................................................................... A4-65 Mismatched memory attributes ........................................................................... A4-69 Transaction buffering ........................................................................................... A4-70 Access permissions ............................................................................................. A4-71 Legacy considerations ......................................................................................... A4-72 Usage examples .................................................................................................. A4-73 Multiple Transactions A5.1 A5.2 A5.3 A5.4 AXI transaction identifiers .................................................................................... A5-76 Transaction ID ..................................................................................................... A5-77 Transaction ordering ........................................................................................... A5-78 Removal of write interleaving support ................................................................. A5-81 AXI4 Ordering Model A6.1 A6.2 A6.3 A6.4 A6.5 Definition of the ordering model .......................................................................... A6-84 Master ordering ................................................................................................... A6-85 Interconnect ordering .......................................................................................... A6-86 Slave ordering ..................................................................................................... A6-87 Response before final destination ....................................................................... A6-88 Atomic Accesses A7.1 A7.2 A7.3 A7.4 Single-copy atomicity size ................................................................................... A7-90 Exclusive accesses ............................................................................................. A7-92 Locked accesses ................................................................................................. A7-95 Atomic access signaling ...................................................................................... A7-96 AXI4 Additional Signaling A8.1 A8.2 A8.3 QoS signaling ...................................................................................................... A8-98 Multiple region signaling ...................................................................................... A8-99 User-defined signaling ....................................................................................... A8-100 Low-power Interface A9.1 A9.2 About the low-power interface ........................................................................... A9-102 Low-power clock control .................................................................................... A9-103 Default Signaling and Interoperability Interoperability principles ................................................................................. A10-110 A10.1 A10.2 Major interface categories ............................................................................... A10-111 A10.3 Default signal values ....................................................................................... A10-112 AMBA AXI4-Lite Interface Specification AMBA AXI4-Lite B1.1 B1.2 B1.3 Definition of AXI4-Lite ........................................................................................ B1-122 Interoperability ................................................................................................... B1-124 Defined conversion mechanism ........................................................................ B1-125 vi Copyright © 2003, 2004, 2010, 2011 ARM. All rights reserved. Non-Confidential ARM IHI 0022D ID102711
Part C Chapter C1 Chapter C2 Chapter C3 Chapter C4 Chapter C5 Chapter C6 Contents B1.4 Conversion, protection, and detection ............................................................... B1-127 ACE Protocol Specification About ACE C1.1 C1.2 C1.3 C1.4 C1.5 C1.6 C1.7 Coherency overview .......................................................................................... C1-132 Protocol overview ............................................................................................... C1-134 Channel overview .............................................................................................. C1-137 Transaction overview ......................................................................................... C1-142 Transaction processing ...................................................................................... C1-146 Concepts required for the ACE specification ..................................................... C1-147 Protocol errors ................................................................................................... C1-150 Signal Descriptions C2.1 C2.2 C2.3 Changes to existing AXI4 channels ................................................................... C2-152 Additional channels defined by ACE .................................................................. C2-153 Additional response signals and signaling requirements defined by ACE ......... C2-155 Channel Signaling Read and write address channel signaling ........................................................ C3-158 C3.1 Read data channel signaling .............................................................................. C3-167 C3.2 C3.3 Read acknowledge signaling ............................................................................. C3-170 C3.4 Write response channel signaling ...................................................................... C3-171 C3.5 Write Acknowledge signaling ............................................................................. C3-172 C3.6 Snoop address channel signaling ...................................................................... C3-173 Snoop response channel signaling .................................................................... C3-176 C3.7 Snoop data channel signaling ............................................................................ C3-180 C3.8 C3.9 Snoop channel dependencies ............................................................................ C3-182 Coherency Transactions on the Read Address and Write Address Channels C4.1 About an initiating master .................................................................................. C4-184 C4.2 About snoop filtering .......................................................................................... C4-187 C4.3 State changes on different transactions ............................................................. C4-188 C4.4 State change descriptions .................................................................................. C4-190 C4.5 Read transactions .............................................................................................. C4-191 C4.6 Clean transactions ............................................................................................. C4-197 C4.7 Make transactions .............................................................................................. C4-200 C4.8 Write transactions .............................................................................................. C4-202 C4.9 Evict transactions ............................................................................................... C4-206 C4.10 Handling overlapping write transactions ............................................................ C4-207 Snoop Transactions C5.1 C5.2 C5.3 Mapping coherency operations to snoop operations ......................................... C5-210 General requirements for snoop transactions .................................................... C5-213 Snoop transactions ............................................................................................ C5-219 Interconnect Requirements C6.1 C6.2 C6.3 C6.4 C6.5 C6.6 C6.7 About the interconnect requirements ................................................................. C6-226 Sequencing transactions .................................................................................... C6-227 Issuing snoop transactions ................................................................................ C6-229 Transaction responses from the interconnect .................................................... C6-232 Interactions with main memory .......................................................................... C6-234 Other requirements ............................................................................................ C6-237 Interoperability considerations ........................................................................... C6-239 ARM IHI 0022D ID102711 Copyright © 2003, 2004, 2010, 2011 ARM. All rights reserved. Non-Confidential vii
Contents Chapter C7 Chapter C8 Chapter C9 Chapter C10 Chapter C11 Chapter C12 Cache Maintenance C7.1 C7.2 ARCACHE and ARDOMAIN requirements ....................................................... C7-242 Other cache maintenance considerations ......................................................... C7-243 Barrier Transactions C8.1 C8.2 C8.3 C8.4 About barrier transactions ................................................................................. C8-248 Barrier transaction signaling .............................................................................. C8-249 Barrier responses and domain boundaries ....................................................... C8-251 Barrier requirements .......................................................................................... C8-254 Exclusive Accesses C9.1 C9.2 C9.3 C9.4 C9.5 C9.6 About Exclusive accesses ................................................................................. C9-260 Role of the master ............................................................................................. C9-261 Role of the interconnect .................................................................................... C9-263 Multiple Exclusive Threads ................................................................................ C9-266 Exclusive Accesses from AXI components ....................................................... C9-267 Transaction requirements .................................................................................. C9-268 Optional External Snoop Filtering C10.1 About external snoop filtering .......................................................................... C10-270 C10.2 Master requirements to support snoop filters .................................................. C10-272 C10.3 External snoop filter requirements ................................................................... C10-273 ACE-Lite C11.1 About ACE-Lite ................................................................................................ C11-276 C11.2 ACE-Lite signal requirements .......................................................................... C11-277 Distributed Virtual Memory Transactions C12.1 About DVM transactions .................................................................................. C12-280 C12.2 Synchronization message ............................................................................... C12-281 C12.3 DVM transaction process and rules ................................................................ C12-282 C12.4 Physical and virtual address space size .......................................................... C12-284 C12.5 DVM transactions format ................................................................................. C12-286 C12.6 DVM transaction restrictions ........................................................................... C12-287 C12.7 DVM Operations .............................................................................................. C12-288 Chapter C13 Interface Control C13.1 About the interface control signals .................................................................. C13-296 Part D Appendix A Appendices Revisions Glossary viii Copyright © 2003, 2004, 2010, 2011 ARM. All rights reserved. Non-Confidential ARM IHI 0022D ID102711
分享到:
收藏