Claims
- 1. A method for enabling a third party transactor to scarf data during a transaction within a hierarchical data storage system, said method comprising:
delivering a data access request from a source device onto an address bus of said hierarchical data storage system, wherein said data access request includes a target address and a source path tag uniquely identifying at least one data storage device within two or more levels of said hierarchical data storage system; appending by said third party transactor an identification tag within said data access request in response to a snooping of said data access request; delivering a data access response onto a data bus, wherein said response includes said source path tag and said target address; and using the device identification tag, determine whether said third party transactor can scarf returning data.
- 2. The method of claim 1, further comprising:
upon receipt of said data access response at a snoop node within a given level of said hierarchical data storage system, comparing said source path tag with a device identification tag assigned to said third party transactor to determine whether a match exists; and in response to a determined match between said source path tag and said device identification tag, processing said data access response within said third party transactor.
- 3. The method of claim 2, wherein said step of processing said data access response comprises updating a memory line within said third party transactor utilizing data within said data access response.
- 4. The method of claim 1, further comprising routing said data access response to said source device.
- 5. The method of claim 1, wherein said delivering step comprises delivering said source path tag on a first bus cycle, delivering said target address on a second bus cycle subsequent to said first bus cycle, and delivering a recovered data unit on a third bus cycle subsequent to said second bus cycle.
- 6. The method of claim 1, further comprising constructing said source path tag by incrementally adding at least one device identification tag to said source path tag, wherein each of said at least one device identification tag uniquely identifies at least one data storage device within each level of said hierarchical data storage system traversed by said data access request such that said data access transaction can be processed in accordance with incremental source path address information encoded within said data access request as said data access request traverses said hierarchical data storage system.
- 7. The method of claim 6, wherein said step of incrementally adding at least one device identification tag to said source path tag comprises, in response to a cache miss at a given data storage device among said plurality of data storage devices, appending a device identification tag that uniquely identifies said third party transactor within a given level of said hierarchical data storage system to said source path tag.
- 8. The method of claim 7, wherein said step of appending a device identification tag is preceded by the step of receiving said data access request at a snoop node from which said third party transactor receives incoming data access requests.
- 9. The method of claim 7, wherein said step of appending a device identification tag is followed by the step of forwarding said data access request to a next snoop node within said hierarchical data storage system.
- 10. A system for enabling a third party transactor to scarf data during a transaction within a hierarchical data storage system, said system comprising:
processing means for delivering a data access request from a source device onto an address bus of said hierarchical data storage system, wherein said data access request includes a target address and a source path tag uniquely identifying at least one data storage device within two or more levels of said hierarchical data storage system; processing means for appending by said third party transactor an identification tag within said data access request in response to a snooping of said data access request; processing means for delivering a data access response onto a data bus, wherein said response includes said source path tag and said target address; and processing means for using the device identification tag to determine whether said third party transactor can scarf returning data.
- 11. The system of claim 10, further comprising:
processing means for comparing said source path tag with a device identification tag assigned to said third party transactor to determine whether a match exists; and processing means responsive to a determined match between said source path tag and said device identification tag for processing said data access response within said third party transactor.
- 12. The system of claim 11, further comprising processing means for updating a memory line within said third party transactor utilizing data within said data access response.
- 13. The system of claim 10, further comprising processing means for routing said data access response to said source device.
- 14. The system of claim 10, processing means for delivering said source path tag on a first bus cycle, delivering said target address on a second bus cycle subsequent to said first bus cycle, and delivering a recovered data unit on a third bus cycle subsequent to said second bus cycle.
- 15. The system of claim 1, further comprising processing means for constructing said source path tag by incrementally adding at least one device identification tag to said source path tag, wherein each of said at least one device identification tag uniquely identifies at least one data storage device within each level of said hierarchical data storage system traversed by said data access request such that said data access transaction can be processed in accordance with incremental source path address information encoded within said data access request as said data access request traverses said hierarchical data storage system.
- 16. The system of claim 15, further comprising processing means for appending a device identification tag that uniquely identifies said third party transactor within a given level of said hierarchical data storage system to said source path tag.
- 17. The system of claim 16, further comprising processing means for receiving said data access request at a snoop node from which said third party transactor receives incoming data access requests.
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] The present application is related to the following copending U.S. patent applications: U.S. patent application Ser. No. ______ (Docket No. AUS920000910US1) filed on ______, 2001, titled “INCREMENTAL TAG BUILD FOR HIERARCHICAL MEMORY ARCHITECTURE”; and U.S. patent application Ser. No. ______ (Docket No. AUS920000911US1) filed on ______ , 2001, titled “ELIMINATION OF VERTICAL BUS QUEUEING WITHIN A HIERARCHICAL MEMORY ARCHITECTURE”. The above mentioned patent applications are assigned to the assignee of the present invention. The content of the cross referenced copending applications is hereby incorporated herein by reference.