Intel 460GX User Manual
Page 4
![background image](/manuals/127207/4/background.png)
iv
Intel® 460GX Chipset System Software Developer’s Manual
System Architecture ........................................................................................................3-1
Processor Coherency............................................................................3-1
Processor to PCI Traffic and PCI to PCI (Peer-to-Peer) Traffic .........................3-3
Inbound PCI Locks................................................................................3-5
Locks with AGP Non-coherent Traffic ...................................................3-5
WXB PCI Hot-Plug Support ...............................................................................3-6
3.8.1
Slot Power-up and Enable ....................................................................3-7
Slot Power-down and Disable ..............................................................3-7
System Address Map ......................................................................................................4-1
Low Extended Memory Region .............................................................4-3
Medium Extended Memory Region .......................................................4-3
High Extended Memory (above 4G)......................................................4-4
Re-mapped Memory Areas ...................................................................4-4
Devices View of the System Memory Map.........................................................4-7
Memory Subsystem ........................................................................................................5-1
Organization .......................................................................................................5-1
5.1.1
Interleaving/Configurations ................................................................................5-4
5.2.1
Summary of Configuration Rules ..........................................................5-5
Non-uniform Memory Configurations ....................................................5-5
Removing a Bad Row ...........................................................................5-6
Memory Scrubbing ................................................................................5-7
Data Integrity and Error Handling...................................................................................6-1