Visible to Intel only — GUID: zwy1677549197498
Ixiasoft
Visible to Intel only — GUID: zwy1677549197498
Ixiasoft
A.2.6.2.1. STIG Operation
The Software triggered instruction generator (STIG) is used to access the volatile and non-volatile configuration registers, and other status and protection registers. The STIG also is used to perform ERASE functions. The direct and indirect access controllers are used only to transfer data. The flashcmd register uses the following parameters to define the command to be issued to the Flash device:
- Instruction opcode
- Number of address bytes
- Number of dummy bytes
- Number of write data bytes
- Write data
- Number of read data bytes
The address is specified through the Flash command address register (flashcmdaddr). Once these settings have been specified, software can trigger the command with the execute command field (execcmd) of the flashcmd register and wait for its completion by polling the command execution status bit (cmdexecstat) of the flashcmd register. A maximum of eight data bytes may be read from the Flash command read data lower (flashcmdrddatalo) and Flash command read data upper (flashcmdrddataup) registers or written to the Flash command write data lower (flashcmdwrdatalo) and Flash command write data upper (flashcmdwrdataup) registers per command.
The STIG issues commands that have a higher priority than all other read accesses and interrupts any read commands that the direct or indirect controllers request. However, the STIG does not interrupt a write sequence that may have been issued through the direct or indirect access controller. In these cases, it might take a long time for the cmdexecstat bit of the flashcmd register indicates the operation is complete.