当前位置:网站首页>PCIe Capabilities List
PCIe Capabilities List
2022-06-26 15:42:00 【Little fatty fruit】
PCIe Configuration space
PCIe take PCI Of 256Bytes The configuration space is extended to 4096bytes.PCIe The configuration space can be divided into two parts :256bytes Of PCI Compatible with some configuration spaces and PCIe Expand the configuration space .
and PCIe Of Capabilities List It's also divided into two parts :PCI Compatible parts and PCIe Extension part Capabilities List.

PCI Capabilities List
stay PCI2.1 Add some abilities after , The protocol is added according to the linked list , This management Capabilities The linked list is called Capabilities;
Whether or not this linked list exists can be saved through PCI Status Register Of bit4(Capabilities List) instructions , When it is 1 Indicates presence ; Otherwise, it does not exist ;0x34h Indicates the first Capabilities The pointer to ;
In each table Capability Include 8bit ID Domain ,ID from PCI SIG Distribute ;8bit The pointer to , Points to the next... In the table Capabilities The location of ( When its value is 0x00h It means the end of the linked list ); And some other registers to perform correlation Capabilities, These registers are followed by the previous registers ;

The above example constructs a simple Capabilities List.0x34h Point to the first one Capabilities The location of , Yes 0xA4h, There is a ID, next Capabilities The pointer points to 0x5Ch, And contains other related registers ;
0xA4h Yes 0x5Ch;0x5Ch Point to 0xE0h;0xE0h Point to 0x0 Indicates that the linked list is over .
PCIe Extended Capabilities List
PCIe Extended Capabilities List and PCI Different ; The relevant registers are placed in 0x100 And higher address locations ; first PCIe Extended Capabilities Register fixed in 0x100 Location , Include 16bit Of Capabilities ID、4bit Capabilities Version Number and 12bit Next Capabilities Offset; Other forms are similar to the above ;
边栏推荐
- 在哪个平台买股票开户安全?求指导
- 1. accounting basis -- several major elements of accounting (general accounting theory, accounting subjects and accounts)
- JS simple deepcopy (Introduction recursion)
- 面试高频 | 你追我赶的Flink双流join
- JS之事件
- Inaccurate data accuracy in ETL process
- [wechat applet] event binding, do you understand?
- 【leetcode】48. Rotate image
- el-dialog拖拽,边界问题完全修正,网上版本的bug修复
- Particle filter PF -- Application in maneuvering target tracking (particle filter vs extended Kalman filter)
猜你喜欢

Notes on brushing questions (19) -- binary tree: modification and construction of binary search tree

Function: crypto JS encryption and decryption

10 minutes to understand bim+gis fusion, common BIM data formats and characteristics

【TcaplusDB知识库】TcaplusDB系统用户组介绍

Comparative analysis of restcloud ETL and kettle

1. accounting basis -- several major elements of accounting (general accounting theory, accounting subjects and accounts)

svg环绕地球动画js特效
![[tcapulusdb knowledge base] Introduction to tcapulusdb system management](/img/5a/28aaf8b115cbf4798cf0b201e4c068.png)
[tcapulusdb knowledge base] Introduction to tcapulusdb system management

Evaluation - TOPSIS

Evaluate:huggingface评价指标模块入门详细介绍
随机推荐
[tcapulusdb knowledge base] tcapulusdb doc acceptance - Introduction to creating game area
【leetcode】112. 路径总和 - 113. 路径总和 II
【TcaplusDB知识库】TcaplusDB单据受理-创建游戏区介绍
2Gcsv文件打不开怎么处理,使用byzer工具
AUTO sharding policy will apply DATA sharding policy as it failed to apply FILE sharding policy
通过券商经理的开户链接开股票账户安全吗?还是去证券公司开户安全?
Is it safe to open a stock account through the account opening link of the broker manager? Or is it safe to open an account in a securities company?
How to load the contour CAD drawing of the engineering coordinate system obtained by the designer into the new earth
[CEPH] cephfs internal implementation (II): example -- undigested
【ceph】mkdir|mksnap流程源码分析|锁状态切换实例
HW安全响应
Is it safe to open a new bond registration account? Is there any risk?
AbortController的使用
[CEPH] cephfs internal implementation (IV): how is MDS started-- Undigested
Database - sequence
JS之手写 bind、apply、call
English grammar_ Adjective / adverb Level 3 - original sentence pattern
【leetcode】331. Verifying the preorder serialization of a binary tree
【SNMP】snmp trap 介绍、安装、命令|Trap的发送与接收代码实现
There are so many vulnerabilities in tcp/ip protocol?