Datasheet

1−2
Up to five general-purpose I/Os
Programmable output select for CLKRUN
Five PCI memory windows and two I/O windows available for the 16-bit interface
Two I/O windows and two memory windows available to the CardBus socket
Exchangeable-card-architecture- (ExCA-) compatible registers are mapped in memory and I/O space
Intel 82365SL-DF and 82365SL register compatible
Ring indicate, SUSPEND
, PCI CLKRUN, and CardBus CCLKRUN
Socket activity LED terminal
PCI bus lock (LOCK
)
Internal ring oscillator
1.3 Related Documents
Advanced Configuration and Power Interface (ACPI) Specification (revision 1.1)
PCI Bus Power Management Interface Specification (revision 1.1)
PCI Bus Power Management Interface Specification for PCI to CardBus Bridges (revision 0.6)
PCI to PCMCIA CardBus Bridge Register Description (Yenta) (revision 2.1)
PCI Local Bus Specification (revision 2.2)
PCI Mobile Design Guide (revision 1.0)
PC Card Standard (revision 7.2)
Serialized IRQ Support for PCI Systems (revision 6)
1.4 Trademarks
Intel is a trademark of Intel Corporation.
MicroStar BGA is a trademark of Texas Instruments.
Other trademarks are the property of their respective owners.
1.5 Document Conventions
Throughout this data manual, several conventions are used to convey information. These conventions are listed
below:
1. To identify a binary number or field, a lower case b follows the numbers. For example: 000b is a 3-bit binary
field.
2. To identify a hexadecimal number or field, a lower case h follows the numbers. For example: 8AFh is a 12-bit
hexadecimal field.
3. All other numbers that appear in this document that do not have either a b or h following the number are
assumed to be decimal format.
4. If the signal or terminal name has a bar above the name (for example, GRST
), then this indicates the logical
NOT function. When asserted, this signal is a logic low, 0, or 0b.
5. RSVD indicates that the referenced item is reserved.
6. In Sections 4 through 6, the configuration space for the controller is defined. For each register bit, the
software access method is identified in an access column. The legend for this access column includes the
following entries:
r – read-only access