Transfer general data between two memory locations
Eight high-speed/high-bandwidth channels
Basic DMA operation modes (direct, simple chaining)
Extended DMA operation modes (advanced chaining and stride capability)
Programmable bandwidth control between channels
Three priority levels supported for source and destination transactions
Can be activated using DREQ pin
Optimized to work with the high speed interfaces
Address translation and mapping unit (ATMU) which allows to define packet attributes as address/device/flow level/
transaction type. ATMU Bypass that allows the descriptor to specify the attributes.
4.12 Serial memory controllers
In addition to the parallel NAND and NOR flash supported by means of the IFC, the chip supports serial flash using eSPI and
SD/eSDHC/eMMC card and device interfaces. The SD/eSDHC/eMMC controller includes a DMA engine, allowing it to
move data from serial flash to external or internal memory following straightforward initiation by software.
Detailed features of the eSPI controller include the following:
Supports SPI full-duplex or half-duplex single master mode with four independent chip-selects
Supports RapidS™ full clock cycle operation, and Winbond dual output read
Independent, programmable baud-rate generator
Programmable clock phase and polarity
Supports four different configurations per chip-select
Detailed features of the SD/eSDHC/eMMC controller include the following:
Conforms to the SD Host Controller Standard Specification version 3.0
Compatible with the MMC System Specification version 4.5
Compatible with the SD Memory Card Physical Layer Specification version 3.01
Compatible with the SD - SDIO Card Specification version 2.0
Designed to work with eMMC devices as well as SD Memory, SDIO, and SD Combo cards and their variants
Supports SD UHS-1 speed modes
4.12.1 PreBoot Loader and nonvolatile memory interfaces
The PreBoot Loader (PBL) operates on behalf of a large number of interfaces.
4.12.1.1 PreBoot Loader (PBL)
The PBL's functions include the following:
Simplifies boot operations, replacing pin strapping resistors with configuration data loaded from nonvolatile memory
Uses the configuration data to initialize other system logic and to copy data from low speed memory interfaces (I
2
C,
IFC, eSPI, SD/SDXC/eMMC) into fully initialized DDR or other access targets in the chip
Releases CPU 0 from reset, allowing the boot processes to begin from fast system memory
Chip features
T2080 Product Brief, Rev 0, 04/2014
Freescale Semiconductor, Inc. 19
4.12.1.2 Integrated Flash Controller
The SoC incorporates an Integrated Flash Controller similar to the one used in some previous generation QorIQ SoCs. The
IFC supports both NAND and NOR flash, as well as a general purpose memory mapped interface for connecting low speed
ASICs and FPGAs.
4.12.1.2.1 NAND Flash features
x8/x16 NAND Flash interface
Optional ECC generation/checking
Flexible timing control to allow interfacing with proprietary NAND devices
SLC and MLC Flash devices support with configurable page sizes of up to 8 KB
Support advance NAND commands like cache, copy-back, and multiplane programming
Boot chip-select (CS0) available after system reset, with boot block size of 8 KB, for execute-in-place boot loading
from NAND Flash
Up to terabyte Flash devices supported
4.12.1.2.2 NOR Flash features
Data bus width of 8/16
Compatible with asynchronous NOR Flash
Directly memory mapped
Supports address data multiplexed (ADM) NOR device
Flexible timing control allows interfacing with proprietary NOR devices
Boot chip-select (CS0) available at system reset
4.12.1.2.3 General-purpose chip-select machine (GPCM)
The IFC's GPCM supports the following features:
Normal GPCM
Support for x8/16-bit device
Compatible with general purpose addressable device, for example, SRAM and ROM
External clock is supported with programmable division ratio (2, 3, 4, and so on, up to 16)
Generic ASIC Interface
Support for x8/16-bit device
Address and Data are shared on I/O bus
Following address and data sequences are supported on I/O bus:
16-bit I/O: AADD
8-bit I/O: AAAADDDD
4.13 Resource partitioning and QorIQ Trust Architecture
Consolidation of discrete CPUs into a single, multicore chip introduces many opportunities for unintended resource
contentions to arise, particularly when multiple, independent software entities reside on a single chip. A system may exhibit
erratic behavior if multiple software partitions cannot effectively partition resources. Device consolidation, combined with a
trend toward embedded systems becoming more open (or more likely to run third-party or open-source software on at least
one of the cores), creates opportunities for malicious code to enter a system.
This chip offers a new level of hardware partitioning support, allowing system developers to ensure software running on any
CPU only accesses the resources (memory, peripherals, and so on) that it is explicitly authorized to access. This section
provides an overview of the features implemented in the chip that help ensure that only trusted software executes on the
CPUs, and that the trusted software remains in control of the system with intended isolation.
Chip features
T2080 Product Brief, Rev 0, 04/2014
20 Freescale Semiconductor, Inc.
4.13.1 Core MMU, UX/SX bits, and embedded hypervisor
The chip's first line of defense against unintended interactions amongst the multiple CPUs/OSes is each core vCPU's MMU.
A vCPU's MMU is configured to determine which addresses in the global address map the CPU is able to read or write. If a
particular resource (memory region, peripheral device, and so on) is dedicated to a single vCPU, that vCPU's MMU is
configured to allow access to those addresses (on 4 KB granularity); other vCPU MMUs are not configured for access to
those addresses, which makes them private. When two vCPUs need to share resources, their MMUs are both configured so
that they have access to the shared address range.
This level of hardware support for partitioning is common today; however, it is not sufficient for many core systems running
diverse software. When the functions of multiple discrete CPUs are consolidated onto a single multicore chip, achieving
strong partitioning should not require the developer to map functions onto vCPUs that are the exclusive owners of specific
platform resources. The alternative, a fully open system with no private resources, is also unacceptable. For this reason, the
core's MMU also includes three levels of access permissions: user, supervisor (OS), and hypervisor. An embedded hypervisor
(for example, KVM, XEN, QorIQ ecosystem partner hypervisor) runs unobtrusively beneath the various OSes running on the
vCPUs, consuming CPU cycles only when an access attempt is made to an embedded hypervisor-managed shared resource.
The embedded hypervisor determines whether the access should be allowed and, if so, proxies the access on behalf of the
original requestor. If malicious or poorly tested software on any vCPU attempts to overwrite important device configuration
registers (including vCPU's MMU), the embedded hypervisor blocks the write. High and low-speed peripheral interfaces
(PCI Express, UART), when not dedicated to a single vCPU/partition, are other examples of embedded hypervisor managed
resources. The degree of security policy enforcement by the embedded hypervisor is implementation-dependent.
In addition to defining regions of memory as being controlled by the user, supervisor, or hypervisor, the core MMU can also
configure memory regions as being non-executable. Preventing CPUs from executing instructions from regions of memory
used as data buffers is a powerful defense against buffer overflows and other runtime attacks. In previous generations of
Power Architecture, this feature was controlled by the NX (no execute) attribute. In new Power Architecture cores such as
the e6500 core, there are separate bits controlling execution for user (UX) and supervisor (SX).
4.13.2 Peripheral access management unit (PAMU)
MMU-based access control works for software running on CPUs; however, these are not the only bus masters in the SoC.
Internal components with bus mastering capability (FMan, RMan, PCI Express controller, PME, SEC, and so on) also need
to be prevented from reading and writing to certain memory regions. These components do not spontaneously generate access
attempts; however, if programmed to do so by buggy or malicious software, any of them could read or write sensitive data
registers and crash the system. For this reason, the SoC also includes a distributed function referred to as the peripheral
access management unit (PAMU).
PAMUs provide address translation and access control for all non-CPU initiators in the system. PAMU access control is
based on the logical I/O device number (LIODN) advertised by a bus master for a given transaction. LIODNs can be static
(for example, PCI Express controller #1 always uses LIODN 123) or they can be dynamic, based on the ID of the CPU that
programmed the initiator (for example, the SEC uses LIODN 456 because it was given a descriptor by vCPU #2). In the
dynamic example, the SoC architecture provides positive identification of the vCPU programming the SEC, preventing
LIODN spoofing.
4.13.3 IO partitioning
The simplest IO configuration in chips running multiple independent software partitions is to dedicate specific IO controllers
(PCI Express, SATA, Serial RapidIO controllers) to specific vCPUs. The core MMUs and PAMUs can enforce these access
permissions to insure that only the software partition owning the IO is able to use it. The obvious problem with this approach
is that there are likely to be more software partitions wanting IO access than there are IO controllers to dedicate to each.
Chip features
T2080 Product Brief, Rev 0, 04/2014
Freescale Semiconductor, Inc. 21

T2081NSN7MQB

Mfr. #:
Manufacturer:
NXP Semiconductors
Description:
Microprocessors - MPU QorIQ, 64b Power Arch, 8x 1.2GHz threads, 1.6GT/s DDR3/3L, 2x10GE, crypto disabled, 0-105C, Rev 1.1
Lifecycle:
New from this manufacturer.
Delivery:
DHL FedEx Ups TNT EMS
Payment:
T/T Paypal Visa MoneyGram Western Union