Datasheet, Volume 2
39
Processor Configuration Registers
• VCm accesses
— See the DMI2 specification for TC mapping to VCm. VCm access only map to
ME stolen DRAM. These transactions carry the direct physical DRAM address
(no redirection or remapping of any kind will occur). This is how the PCH
Manageability engine accesses its dedicated DRAM stolen space.
— DMI block will decode these transactions to ensure only ME stolen memory is
targeted, and abort otherwise.
— VCm transactions will only route non-snoop.
— VCm transactions will not go through VTd remap tables.
— The remapbase/remaplimit registers to not apply to VCm transactions.
Figure 2-7. Example: DMI Upstream VC0 Memory Map
A0000-BFFFF (VGA)
GMADR
FEE0_0000 – FEEF_FFFF( MSI)
TSEG_BASE
mem writes
non-snoop mem write
mem reads
invalid transaction
mem writes
CPU (IntLogical/IntPhysical)
mem reads
Invalid transaction
mem writes
peer write (if matching PEG range else invalid)
mem reads
Invalid transaction
64GB
REMAPLIMIT
TOLUD
4GB
REMAPBASE
mem writes
Route based on SNR bit.
mem reads
Route based on SNR bit.
TOM = total physical DRAM
Upstream Initiated VC0 Cycle Memory Map
TOLUD-(Gfx Stolen)-(Gfx GTT stolen)
-(TSEG)
TSEG_BASE - DPR
2TB
mem writes
peer write (based on Dev1 VGA en) else invalid
mem reads
Invalid transaction
TOUUD
Содержание 2ND GENERATION CORE PROCESSOR FAMILY DESKTOP - VOLUME 2 01-2011
Страница 12: ...Introduction 12 Datasheet Volume 2...