Intel Xeon® Processor X3430 (8M Cache, 2.40 GHz) BX80605X3430 User Manual

Product codes
BX80605X3430
Page of 296
Intel® Xeon® Processor 3400 Series Datasheet, Volume 2
285
System Address Map
5.5.4
SMM Control Combinations
The G_SMRAME bit provides a global enable for all SMM memory. The D_OPEN bit 
allows software to write to the SMM ranges without being in SMM mode. BIOS software 
can use this bit to initialize SMM code at powerup. The D_LCK bit limits the SMM range 
access to only SMM mode accesses. The D_CLS bit causes SMM (both CSEG and TSEG) 
data accesses to be forwarded to the DMI Interface or PCI Express. The SMM software 
can use this bit to write to video memory while running SMM code out of DRAM.
5.5.5
SMM Space Decode and Transaction Handling
Only the processor is allowed to access SMM space. PCI Express and DMI Interface 
originated transactions are not allowed to SMM space. 
5.5.6
Processor WB Transaction to an Enabled SMM Address Space
Processor Writeback transactions (REQa[1]# = 0) to enabled SMM Address Space must 
be written to the associated SMM DRAM even though D_OPEN=0 and the transaction is 
not performed in SMM mode. This ensures SMM space cache coherency when cacheable 
extended SMM space is used.
5.5.7
SMM Access Through GTT TLB 
Accesses through GTT TLB address translation to enabled SMM DRAM space are not 
allowed. Writes will be routed to Memory address 000C_0000h with byte enables de-
asserted and reads will be routed to Memory address 000C_0000h. If a GTT TLB 
translated address hits enabled SMM DRAM space, an error is recorded in the 
PGTBL_ER register. 
PCI Express and DMI Interface originated accesses are never allowed to access SMM 
space directly or through the GTT TLB address translation. If a GTT TLB translated 
address hits enabled SMM DRAM space, an error is recorded in the PGTBL_ER register.
PCI Express and DMI Interface write accesses through GMADR range will be snooped. 
Assesses to GMADR linear range (defined using fence registers) are supported. PCI 
Express and DMI Interface tileY and tileX writes to GMADR are not supported. If, when 
translated, the resulting physical address is to enabled SMM DRAM space, the request 
will be remapped to address 000C_0000h with de-asserted byte enables. 
Table 5-3.
SMM Control Table 
G_SMRAME
D_LCK
D_CLS
D_OPEN
Processor in 
SMM Mode
SMM Code 
Access 
SMM Data 
Access
0
x
X
x
x
Disable
Disable
1
0
X
0
0
Disable
Disable
1
0
0
0
1
Enable
Enable
1
0
0
1
x
Enable
Enable
1
0
1
0
1
Enable
Disable
1
0
1
1
x
Invalid
Invalid
1
1
X
x
0
Disable
Disable
1
1
0
x
1
Enable
Enable
1
1
1
x
1
Enable
Disable