HT provides a message passing mechanism between the Host Bridge and the System Management Controller (SMC). One of the primary purposes of HT messages is to eliminate dedicated pins and traces that would otherwise be required to signal various events, reducing pin count and cost. These System Management (SM) messages are delivered via packets that support a wide variety of functions including:
HT System Management messages in conjunction with LDTSTOP# may be used to support operations such as changes in operating frequency and link width, or to disable the links to save power. It is also through System Management (SM) requests that many of the x86 compatibility mechanisms are accomplished as indicated above. Further, x86 platforms are required to support SM and LDTSTOP# for power management. Power Management support for HT devices is optional in non-x86 platforms; however, many non-x86 systems do support power management. Note also that the specification requires all HT devices to forward SM packets in both directions. Sources of SM RequestSystem Management requests may be either sent in the upstream or downstream direction, as illustrated in Figure 9-1 on page 217. All SM requests moving upstream originate at the System Management Controller (SMC) and downstream requests originate at the Host Bridge. Note that the SMC typically resides in the south bridge (or I/O Controller Hub) where the legacy signals typically originate and where power management registers reside. Figure 9-1. SM Request Sources
System Management Address RangeSystem Management transactions are recognized by their assigned address range. The HT specification reserves a 1MB address range for system management transactions from FD_F910_0000h to FD_F91F_FFFFh. In reality, only the upper address bits are needed to identify that the transaction falls within the assigned 1MB range. SM request packets include only the upper 20 bits (A39:A20) of the HT address for identifying the SM range (FD_F91h). Note that the lower 5 nibbles (or 20 bits) of the address are not defined and could theoretically be any value between 0_0000h and F_FFFF. The 1MB block of SM address space serves only to identify SM transactions and does not actually target any memory locations. The SMC & Upstream Request PacketsThe System Management Controller generates SM requests in response to both software initiated events (i.e., writes to registers within the south bridge) and hardware events (e.g. inactivity timeouts). Upstream Request Packet FormatSMC-originated messages are delivered as posted Sized Write transactions, consisting of a SM request packet followed by a 4 byte data packet. An SM transaction is identified by both the Sized Write command and the assigned SM address range. The format of the upstream moving SM request packet is illustrated in Figure 9-2. The specification requires the following field values:
Figure 9-2. Format of SM Request Packet Issued by the System Management Controller
An interesting aspect of the upstream SM transactions is that the Host Bridge reflects them all back downstream across all links as broadcast SM messages. System Management Commands ” UpstreamThe System Management Command field (SysMgtCmd) defines the type of SM request being issued. Table 9-1 on page 219 summarizes the SM command options for the upstream direction. All of the upstream messages represent state changes of various signals as indicated in Table 9-1. (Chapter 22, entitled "X86 CPU Compatibility," on page 491 details each signal type.) Three distinct pieces of information may be included in the upstream SysMgtCmd:
Table 9-1. Summary of Upstream SysMgtCmd Encodings
TheHost Bridge & Downstream Request PacketsThe Host Bridge generates all SM packets moving in the downstream direction. These transactions are delivered via Broadcast request packets that have no associated data packet. DownstreamRequest Packet FormatThe SM request packet format delivered by the Host Bridge is illustrated in Figure 9-3. The packet format for downstream SM messages contains the following required data field values:
Figure 9-3. Format of SM Request Packet Issued by the Host Bridge
System Management CommandsTable 9-2 on page 221 summarizes the SM command options. The highlighted entries in Table 9-2 indicate commands that originate at the Host Bridge, while the other entries originate from the SMC and are reflected back downstream by the Host Bridge. Table 9-2. Summary of SysMgtCmd Encodings
Detailed descriptions of each of the virtual wires and special cycles can be found in Chapter 22. |