Click here to load reader

Mobile Intel Celeron Processor ... Mobile 4th Generation Intel® Core Processor Family, Mobile Intel ® Pentium Processor Family, and Mobile Intel Celeron Processor Family September

  • View
    1

  • Download
    0

Embed Size (px)

Text of Mobile Intel Celeron Processor ... Mobile 4th Generation Intel® Core Processor Family, Mobile...

  • Mobile 4th Generation Intel® Core™ Processor Family, Mobile Intel® Pentium® Processor Family, and Mobile Intel® Celeron® Processor Family Datasheet – Volume 2 of 2

    Supporting 4th Generation Intel® Core™ processor based on Mobile U-Processor and Y-Processor Lines Supporting Mobile Intel® Pentium® and Mobile Intel® Celeron® Processor Families

    September 2013

    Order No.: 329002-002

  • INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT.

    A "Mission Critical Application" is any application in which failure of the Intel Product could result, directly or indirectly, in personal injury or death. SHOULD YOU PURCHASE OR USE INTEL'S PRODUCTS FOR ANY SUCH MISSION CRITICAL APPLICATION, YOU SHALL INDEMNIFY AND HOLD INTEL AND ITS SUBSIDIARIES, SUBCONTRACTORS AND AFFILIATES, AND THE DIRECTORS, OFFICERS, AND EMPLOYEES OF EACH, HARMLESS AGAINST ALL CLAIMS COSTS, DAMAGES, AND EXPENSES AND REASONABLE ATTORNEYS' FEES ARISING OUT OF, DIRECTLY OR INDIRECTLY, ANY CLAIM OF PRODUCT LIABILITY, PERSONAL INJURY, OR DEATH ARISING IN ANY WAY OUT OF SUCH MISSION CRITICAL APPLICATION, WHETHER OR NOT INTEL OR ITS SUBCONTRACTOR WAS NEGLIGENT IN THE DESIGN, MANUFACTURE, OR WARNING OF THE INTEL PRODUCT OR ANY OF ITS PARTS.

    Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined". Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a design with this information.

    The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request.

    Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order.

    This document contains information on products in the design phase of development.

    Code Names are only for use by Intel to identify products, platforms, programs, services, etc. ("products") in development by Intel that have not been made commercially available to the public, i.e., announced, launched or shipped. They are never to be used as "commercial" names for products. Also, they are not intended to function as trademarks.

    For Enhanced Intel SpeedStep® Technology, see the Processor Spec Finder at http://ark.intel.com/ or contact your Intel representative for more information.

    Intel® AES-NI requires a computer system with an AES-NI enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. AES-NI is available on select Intel® processors. For availability, consult your reseller or system manufacturer. For more information, see http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni/.

    Intel® Hyper-Threading Technology (Intel® HT Technology) is available on select Intel® Core™ processors. It requires an Intel® HT Technology enabled system. Consult your PC manufacturer. Performance will vary depending on the specific hardware and software used. Not available on Intel®

    Core™ i5-750. For more information including details on which processors support Intel® HT Technology, visit http://www.intel.com/info/ hyperthreading.

    Intel® 64 architecture requires a system with a 64-bit enabled processor, chipset, BIOS and software. Performance will vary depending on the specific hardware and software you use. Consult your PC manufacturer for more information. For more information, visit http://www.intel.com/ content/www/us/en/architecture-and-technology/microarchitecture/intel-64-architecture-general.html.

    No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology (Intel® TXT) requires a computer with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). Intel TXT also requires the system to contain a TPM v1.s. For more information, visit http://www.intel.com/technology/ security.

    Intel® Virtualization Technology (Intel® VT) requires a computer system with an enabled Intel® processor, BIOS, and virtual machine monitor (VMM). Functionality, performance or other benefits will vary depending on hardware and software configurations. Software applications may not be compatible with all operating systems. Consult your PC manufacturer. For more information, visit http://www.intel.com/go/virtualization.

    Requires a system with Intel® Turbo Boost Technology. Intel Turbo Boost Technology and Intel Turbo Boost Technology 2.0 are only available on select Intel® processors. Consult your PC manufacturer. Performance varies depending on hardware, software, and system configuration. For more information, visit http://www.intel.com/go/turbo.

    Requires activation and a system with a corporate network connection, an Intel® AMT-enabled chipset, network hardware and software. For notebooks, Intel AMT may be unavailable or limited over a host OS-based VPN, when connecting wirelessly, on battery power, sleeping, hibernating or powered off. Results dependent upon hardware, setup and configuration.

    Intel, Intel Core, Celeron, Pentium, and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.

    *Other names and brands may be claimed as the property of others.

    Copyright © 2013, Intel Corporation. All rights reserved.

    Mobile 4th Generation Intel® Core™ Processor Family, Mobile Intel® Pentium® Processor Family, and Mobile Intel® Celeron® Processor Family Datasheet – Volume 2 of 2 September 2013 2 Order No.: 329002-002

    http://ark.intel.com/ http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni/ http://www.intel.com/info/hyperthreading http://www.intel.com/info/hyperthreading http://www.intel.com/content/www/us/en/architecture-and-technology/microarchitecture/intel-64-architecture-general.html http://www.intel.com/content/www/us/en/architecture-and-technology/microarchitecture/intel-64-architecture-general.html http://www.intel.com/technology/security http://www.intel.com/technology/security http://www.intel.com/go/virtualization http://www.intel.com/go/turbo

  • Contents

    Revision History................................................................................................................11

    1.0 Introduction................................................................................................................12

    2.0 Processor Configuration Registers.............................................................................. 13 2.1 Register Terminology............................................................................................ 13 2.2 PCI Devices and Functions..................................................................................... 14 2.3 System Address Map.............................................................................................15 2.4 Legacy Address Range...........................................................................................18 2.5 Main Memory Address Range (1 MB – TOLUD).......................................................... 21 2.6 PCI Memory Address Range (TOLUD – 4 GB)............................................................ 24 2.7 Main Memory Address Space (4 GB to TOUUD)......................................................... 27 2.8 PCI Express* Configuration Address Space...............................................................30 2.9 Graphics Memory Address Ranges...........................................................................30 2.10 System Management Mode (SMM)........................................................................31 2.11 SMM and VGA Access Through GTT TLB.................................................................31 2.12 Intel® Management Engine (Intel® ME) Stolen Memory Accesses..............................32 2.13 I/O Address Space............................................................................................. 32 2.14 Direct Media Interface (DMI) Interface Decode Rules.............................................. 33 2.15 PCI Express* Interface Decode Rules....................................................................36 2.16 Legacy VGA and I/O Range Decode Rules..............................................................37 2.17 I/O Mapped Registers......................................................................................... 40

    3.0 Host Device Configuration Registers........................................................................... 41 3.1 Host Bridge/DRAM (0/0/0/CFG) Registers Summary.................................................. 41

    3.1.1 VID—Vendor Identification......................................................................... 42 3.1.2 DID—Device Identification....................