參數(shù)資料
型號(hào): FW82815
英文描述: Controller Miscellaneous - Datasheet Reference
中文描述: 控制器雜項(xiàng)-數(shù)據(jù)表參考
文件頁(yè)數(shù): 126/172頁(yè)
文件大?。?/td> 795K
代理商: FW82815
第1頁(yè)第2頁(yè)第3頁(yè)第4頁(yè)第5頁(yè)第6頁(yè)第7頁(yè)第8頁(yè)第9頁(yè)第10頁(yè)第11頁(yè)第12頁(yè)第13頁(yè)第14頁(yè)第15頁(yè)第16頁(yè)第17頁(yè)第18頁(yè)第19頁(yè)第20頁(yè)第21頁(yè)第22頁(yè)第23頁(yè)第24頁(yè)第25頁(yè)第26頁(yè)第27頁(yè)第28頁(yè)第29頁(yè)第30頁(yè)第31頁(yè)第32頁(yè)第33頁(yè)第34頁(yè)第35頁(yè)第36頁(yè)第37頁(yè)第38頁(yè)第39頁(yè)第40頁(yè)第41頁(yè)第42頁(yè)第43頁(yè)第44頁(yè)第45頁(yè)第46頁(yè)第47頁(yè)第48頁(yè)第49頁(yè)第50頁(yè)第51頁(yè)第52頁(yè)第53頁(yè)第54頁(yè)第55頁(yè)第56頁(yè)第57頁(yè)第58頁(yè)第59頁(yè)第60頁(yè)第61頁(yè)第62頁(yè)第63頁(yè)第64頁(yè)第65頁(yè)第66頁(yè)第67頁(yè)第68頁(yè)第69頁(yè)第70頁(yè)第71頁(yè)第72頁(yè)第73頁(yè)第74頁(yè)第75頁(yè)第76頁(yè)第77頁(yè)第78頁(yè)第79頁(yè)第80頁(yè)第81頁(yè)第82頁(yè)第83頁(yè)第84頁(yè)第85頁(yè)第86頁(yè)第87頁(yè)第88頁(yè)第89頁(yè)第90頁(yè)第91頁(yè)第92頁(yè)第93頁(yè)第94頁(yè)第95頁(yè)第96頁(yè)第97頁(yè)第98頁(yè)第99頁(yè)第100頁(yè)第101頁(yè)第102頁(yè)第103頁(yè)第104頁(yè)第105頁(yè)第106頁(yè)第107頁(yè)第108頁(yè)第109頁(yè)第110頁(yè)第111頁(yè)第112頁(yè)第113頁(yè)第114頁(yè)第115頁(yè)第116頁(yè)第117頁(yè)第118頁(yè)第119頁(yè)第120頁(yè)第121頁(yè)第122頁(yè)第123頁(yè)第124頁(yè)第125頁(yè)當(dāng)前第126頁(yè)第127頁(yè)第128頁(yè)第129頁(yè)第130頁(yè)第131頁(yè)第132頁(yè)第133頁(yè)第134頁(yè)第135頁(yè)第136頁(yè)第137頁(yè)第138頁(yè)第139頁(yè)第140頁(yè)第141頁(yè)第142頁(yè)第143頁(yè)第144頁(yè)第145頁(yè)第146頁(yè)第147頁(yè)第148頁(yè)第149頁(yè)第150頁(yè)第151頁(yè)第152頁(yè)第153頁(yè)第154頁(yè)第155頁(yè)第156頁(yè)第157頁(yè)第158頁(yè)第159頁(yè)第160頁(yè)第161頁(yè)第162頁(yè)第163頁(yè)第164頁(yè)第165頁(yè)第166頁(yè)第167頁(yè)第168頁(yè)第169頁(yè)第170頁(yè)第171頁(yè)第172頁(yè)
82815 GMCH
R
126
Datasheet
TSEG
TSEG can be up to 1 MB and is at the top of memory. SMM-mode processor accesses to enabled TSEG
access the physical DRAM at the same address. Non-SMM-mode processor accesses to enabled TSEG
are considered invalid and are terminated immediately on the FSB. The exception is non-SMM-mode
write-back cycles. They are directed to the physical SMM space to maintain cache coherency. AGP and
hub interface originated cycle to enabled SMM space are not allowed.
The size of the SMRAM space is determined by the USMM value in the SMRAM register. When the
extended SMRAM space is enabled, non-SMM processor accesses and all other accesses in this range
are forwarded to the hub interface. When SMM is enabled, the amount of memory available to the
system is equal to the amount of physical DRAM minus the value in the TSEG register.
Note that there is potential for cache corruption if illegal accesses are requested to TSEG. Originally,
TSEG was intended for additional data storage for non-cached solutions. As such, it added protection as
direct reads and writes to TSEG are not allowed to occur outside of SMM. However, when the region is
enabled as cacheable, this protection can cause problems if improperly used. The reason is that, if any
piece of software (including ITP) is to read TSEG outside of SMM, the read can cause corruption of the
cached version of the code in the processor and result in a SMM “hang”.
Example of Problem Manifestation:
1. SMM handler initialized and SMM code/data is written to TSEG
2. Processor cache emptied of TSEG data sometime later as cache lines are evicted and replaced
3. Rogue application requests illegal memory read to TSEG (illegal because processor is not in
SMM)
4. Processor runs memory read cycles to GMCH to perform read from TSEG
5. GMCH realizes processor is NOT in SMM and blocks the reads from targeting actual memory.
Instead it runs the cycle down the hub interface, which ICH2 then converts to a PCI cycle. This
typically gets master aborted and returns a floating bus (FFFFFFFFh).
6. Processor read cycles complete and FFFFFFFFh is pulled into processor cache lines.
7. Processor thinks it has valid TSEG code/data in its cache, when it really has incorrect data
(FFFFFFFFh)
8. Processor runs other system level code, evicting cache lines as needed, but some lines of
FFFFFFFFh remain
9. Eventually, an SMI is generated and this puts the processor into SMM and calls for execution of
the SMM handler stored in TSEG.
10. Processor begins fetching TSEG and hits a line in its cache read by the rogue application
(FFFFFFFFh).
11. This code is corrupted and a “hang” is eminent
The result is that the TSEG protection built into the chipset could potentially cause a system to “hang”
for cached operations, if not properly used. In fact, an application that only reads from the TSEG region
can cause SMRAM corruption by causing the SMM handler to execute bogus code fetched from the PCI
bus.
An alternative is to not use TSEG chipset features at all when running cached. Simply reserve a piece of
system memory at the top of memory region, indicate a lower actual top of memory to the operating
system (through E820h/E801h function calls), and use this region as SMRAM. As there is no restriction
that this memory cannot be accessed when not in SMM mode, then the GMCH will not block accesses to
it. When it is cached, a read to the region (whether performed inside or outside of SMRAM) will return
the correct data and this coherency issue is avoided.
相關(guān)PDF資料
PDF描述
FWA-25A10F Fuse
FWA-30A10F Fuse
FWA-35A21F Fuse
FWA-40A21F Fuse
FWA-45A21F Fuse
相關(guān)代理商/技術(shù)參數(shù)
參數(shù)描述
FW82815 S L5NQ 制造商:Intel 功能描述:Graphics and Memory Controller Hub 544-Pin BGA
FW82815EM S L4MP 制造商:Intel 功能描述:GRAPHICS AND MEMORY CONTROLLER HUB (GMCH2-M)
FW82815SL5NQ 制造商:Intel 功能描述:
FW828201CA 制造商:未知廠家 制造商全稱:未知廠家 功能描述:Controller Miscellaneous - Datasheet Reference
FW82840 S L3TA 制造商:Intel 功能描述:Memory Controller Hub 544-Pin BGA