Specification Update

MOBILE INTEL
®
CELERON
®
PROCESSOR at 466 MHz, 433 MHz, 400 MHz,
366 MHz, 333 MHz, 300 MHz, 266 MHz SPECIFICATION UPDATE
20
H13. Potential Early Deassertion of LOCK# During Split-Lock
Cycles
Problem: During a split-lock cycle there are four bus transactions: 1st ADS# (a partial read), 2nd ADS# (a
partial read), 3rd ADS# (a partial write), and the 4th ADS# (a partial write). Due to this erratum, LOCK# may
deassert one clock after the 4th ADS# of the split-lock cycle instead of after the 4th RS# assertion
corresponding to the 4th ADS# has been sampled. The following sequence of events are required for this
erratum to occur:
1. A lock cycle occurs (split or nonsplit).
2. Five more bus transactions (assertion of ADS#) occur.
3. A split-lock cycle occurs and BNR# toggles after the 3rd ADS# (partial write) of the split-lock cycle. This in
turn delays the assertion of the 4th ADS# of the split-lock cycle. BNR# toggling at this time could most likely
happen when the bus is set for an IOQ depth of 2.
When all of these events occur, LOCK# will be deasserted in the next clock after the 4th ADS# of the split-lock
cycle.
Implication:
This may affect chipset logic which monitors the behavior of LOCK# deassertion.
Workaround: None identified
Status: For the steppings affected see the Summary of Changes at the beginning of this section.
H14. A20M# May Be Inverted After Returning From SMM and
Reset
Problem: This erratum is seen when software causes the following events to occur:
1. The assertion of A20M# in real address mode.
2. After entering the 1-Mbyte address wrap-around mode caused by the assertion of A20M#, there is an
assertion of SMI# intended to cause a Reset or remove power to the processor. Once in the SMM handler,
software saves the SMM state save map to an area of nonvolatile memory from which it can be restored at
some point in the future. Then software asserts RESET# or removes power to the processor.
3. After exiting Reset or completion of power-on, software asserts SMI# again. Once in the SMM handler, it
then retrieves the old SMM state save map which was saved in event 2 above and copies it into the current
SMM state save map. Software then asserts A20M# and executes the RSM instruction. After exiting the
SMM handler, the polarity of A20M# is inverted.
Implication:
If this erratum occurs, A20M# will behave with a polarity opposite from what is expected (e.g.,
the 1-Mbyte address wrap-around mode is enabled when A20M# is deasserted, and does not occur when
A20M# is asserted).
Workaround: Software should save the A20M# signal state in nonvolatile memory before an assertion of
RESET# or a power down condition. After coming out of Reset or at power on, SMI# should be asserted again.
During the restoration of the old SMM state save map described in event 3 above, the entire map should be
restored, except for bit 5 of the byte at offset 7F18h. This bit should retain the value assigned to it when the
SMM state save map was created in event 3. The SMM handler should then restore the original value of the
A20M# signal.
Status: For the steppings affected see the Summary of Changes at the beginning of this section.