17.05.2015 Views

TI486 Microprocessor - Al Kossow's Bitsavers

TI486 Microprocessor - Al Kossow's Bitsavers

TI486 Microprocessor - Al Kossow's Bitsavers

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Contents<br />

1 Product Overview ............................................................... 1-3<br />

1.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 1-4<br />

1.2 Differences Between the <strong>TI486</strong>SLC/E and <strong>TI486</strong>DLC/E . . . . . . . . . . . . . . . . . . . . . . . . .. 1-5<br />

1.3 <strong>TI486</strong>SLC/E Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 1-6<br />

1.4 <strong>TI486</strong>DLC/E Overview ...................................................... 1-9<br />

1.5 Execution Pipeline ........................................................ , 1-12<br />

1.6 On-Chip Cache ........................................................... , 1-12<br />

1 .7 Power Management ....................................................... 1-13<br />

1.7.1 Suspend Mode and Static Operation .................................. 1-13<br />

1.7.2 3-V Operation .......................................... , .......... , 1-13<br />

1.8 System Management Mode (SMM) .......................................... 1-13<br />

2 Programming Interface .......................................................... 2-3<br />

2.1 Processor Initialization ...................................................... 2-4<br />

2.2 Instruction Set Overview ..................................................... 2-7<br />

2.2.1 Lock Prefix ......................................................... 2-8<br />

2.3 Register Set ............................................................... 2-9<br />

2.3.1 Application Register Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 2-9<br />

2.3.2 System Register Set ............................................... , 2-17<br />

2.4 Address Spaces ..................... , .......... , ... , ............. " .. '" ., 2-37<br />

2.4.1 1/0 Address Space ................................................. 2-38<br />

2.4.2 Memory Address Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 2-39<br />

2.5 Interrupts and Exceptions .................................................. , 2-45<br />

2.5.1 Interrupts ......................................................... , 2-45<br />

2.5.2 Exceptions ....................................................... , 2-46<br />

2.5.3 Interrupt Vectors ................................................... , 2-47<br />

2.5.4 Interrupt and Exception Priorities ..................................... 2-48<br />

2.5.5 Exceptions in Real Mode ............................................ 2-49<br />

2.5.6 Error Codes ....................................................... 2-49<br />

2.6 System Management Mode ............................. , ... , " ............ , 2-51<br />

2.6.1 Introduction ........................................................ 2-51<br />

2.6.2 SMM Operations ................................................... 2-52<br />

2.6.3 SMM Memory Space Header ........................................ 2-53<br />

2.6.4 SMM Instructions .................................................. 2-54<br />

2.6.5 SMM Memory Space. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 2-55<br />

2.6.6 SMI Service Routine Execution ........ '" ..... '" .................... 2-56<br />

2.7 Shutdown and Halt ........................................................ 2-58<br />

2.8 Protection ............................................................... , 2-58<br />

2.8.2 1/0 Privilege Levels ................................................ , 2-59<br />

2.8.3 Privilege Level Transfers ............................................ 2-59<br />

2.8.4 Initialization and Transition to Protected Mode . . . . . . . . . . . . . . . . . . . . . . . . .. 2-60<br />

ix

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!