P5020 QorIQ Communications Processor Product Brief, Rev. 1
Features
Freescale Semiconductor22
3.9.4.5.2 PME Match Detection
Within the PME, match detection proceeds in stages. The key element scanner performs initial byte pattern
matching, with handoff to the data examination engine for elimination of false positives through more
complex comparisons. As the name implies, the stateful rule engine receives confirmed basic matches
from the earlier stages, and monitors a stream for addition for subsequent matches that define an event
pattern.
Figure 7. PME 2.1 Block Diagram
3.9.4.6 RapidIO Message Manager (RMan)
The RapidIO message manager (RMan) produces and consumes Type 8 Port-write, Type 9 Data
Streaming, Type 10 Doorbells and Type 11 Messaging traffic and is capable of producing Type 5 NWRITE
and Type 6 SWRITE transactions.
For inbound traffic, the RMan supports up to 17 open reassembly contexts as a arbitrary mix of Type 9,
and Type 11 traffic.
As ingress packets arrives at the RMan, they are compared against up to 64 classification rules to determine
the target queue. These rules support Type 8, 9, 10 and 11 transaction types. They may be wildcarded and
are configured as masks over selected header fields. The following fields are maskable as part of each
classification rule:
Transaction types:
RapidIO port
Source ID
Destination ID
•Flow level
Type 9 messaging-specific fields:
Class-of-service (CoS)
StreamID
Type 11 messaging-specific fields:
Mailbox
Results
Stateful
Rule
Engine
(SRE)
Data
Examination
Engine
(DXE)
Key
Element
Scanning
Engine
(KES)
Hash
Ta bl e s
DMA
(Queue/
Buffer
Manager
Interfaces)
On-Chip
System
Interface
Access to Pattern Descriptions and State
Features
P5020 QorIQ Communications Processor Product Brief, Rev. 1
Freescale Semiconductor 23
Extended mailbox
•Letter
Should the packet remain unclassified, the traffic is retried with an error in the case of Type 10 and 11
traffic and dropped in the case of Type 9 traffic. Dropped traffic is logged and upon a threshold can assert
an error interrupt.
Classification allows Type 9, 10 and 11 traffic to be distributed across 64 possible Frame queues. A single
dedicated inbound Type 8 Port-write Frame queue is provided.
For all outbound traffic types (Type 8, 9, 10 and 11), the Datapath Acceleration Architecture allows a very
large number of outbound Frame queues effectively limited by system, software and performance
constraints.
3.9.4.7 RAID5/6 Engine
The P5020 includes a RAID5/6 Engine for storage applications, which significantly extends the capability
and performance of earlier PowerQUICC RAID (XOR) functionality. The RAID5/6 Engine supports a
variety of storage-related functions such as Move, Generate XOR, RAID 6 Parity, Fill and Check. The
following table summarizes the functions supported by the engine.
The RAID5/6 Engine supports commands with between 1 and 16 sources for relevant functions. A simple
DMA move operation is supported along with a two-destination multicast move that duplicates the source
data. Both of these simple operations are the foundation for commands that support Data Protection
Information (DIF) insertion, updating and checking. A single RAID5/6 parity generate function is
Table 7. RAID5/6 Engine Supported Functions
Function No. of Sources No. of Destinations
Command Options
Scatter/Gather DIF
No Op
Single Source Move 1 1 Y N
Multicast Move 1 2 Y N
Add DIF 1 1 or 2 Y Y
Remove DIF 1 1 or 2 Y Y
Update DIF 1 1 or 2 Y Y
Generate Q Parity 2–16 1 Y Y
Generate Q and Q Parity 2–16 2 Y Y
Fill Pattern 1 Y Y
Check Pattern 1 Y Y
Fill LFSR 1 Y N
Check LFSR 1 Y N
Compare 2 Y Y
Gather DIF 1 1 Y Y
P5020 QorIQ Communications Processor Product Brief, Rev. 1
Features
Freescale Semiconductor24
supported which calculates Galois field (GF) based parity calculation for (where MULT = 1 performs
simple XOR) up to 16 sources. A variant supports calculation of two GF multiplies for use in calculating
XOR and RAID 6 Parity simultaneously without reading the input data twice. This command calculates
two GF multiplications across the sources and writes them to two destinations. The GF primitive
polynomial is programmable and thus supports common polynomials such as 0x11D and 0x14D.
In addition to classic storage acceleration, the RAID5/6 Engine provides some additional helpful functions
including the ability to fill or check a region based on a 128-bit value, incrementing value or using a LSFR
algorithm. A compare function is provided that compares two regions of memory and reports the result to
a result queue.
The RAID5/6 Engine supports ANSI T10 Data Protection Information and is capable of checking, adding,
removing and updating the Data Integrity Fields (DIF). All Reference and Application Tags seen during
an operation may be set to an initial value or that value can be incremented as blocks are processed by the
engine. Reference Tag, Application Tag can be configurable disabled/enabled from DIF function on per
command basis. It also supports IP checksum-based guard generation and checking (RFC 793), in addition
to the T10 CRC based guard.
3.10 Avoiding Resource Contentions Using
the QorIQ Trust Architecture
Consolidation of discrete CPUs into a single, multicore SoC and potential repartitioning of legacy software
on those cores introduces many opportunities for unintended resource contentions to arise, but the QorIQ
Trust Architecture can reduce the risk of these issues.
3.10.1 QorIQ Trust Architecture Benefits
A system may exhibit erratic behavior if the multiple CPUs do not effectively partition and share system
resources. While it can be challenging to prevent unintended resource contention, stopping malicious
software is much more difficult. Device consolidation combined with a trend toward embedded systems
becoming more open (or more likely to run third-party or open-source software on at least one of the cores)
creates opportunities for malicious code to enter a system.
The P5020 offers a new level of hardware partitioning support, allowing system developers to ensure
software running on any CPU only accesses the resources (memory, peripherals, etc.) that it is explicitly
authorized to access. This may not seem like a challenge in an SMP environment, because the OS performs
resource allocation for the applications running on it. However, it is a very difficult problem to overcome
in AMP environments where there may be multiple instances of the same OS, or even different OSes
running on the various CPU cores. Even OS protections in an SMP system may be insufficient in the
presence of malicious software.
3.10.2 e5500 Core MMU and Embedded Hypervisor
The P5020’s first line of defense against unintended interactions amongst the multiple CPUs/OSes is each
core’s MMU, which are configured to determine which addresses in the global address map the CPU is
able to read or write. If a particular resource (such as a portion of memory, peripheral device, and so on)
is dedicated to a single CPU, that CPU’s MMU is configured to allow access to those addresses (on

P5020NSN1MMB

Mfr. #:
Manufacturer:
NXP / Freescale
Description:
Microprocessors - MPU P5020 ST NE 1200/1200 R2
Lifecycle:
New from this manufacturer.
Delivery:
DHL FedEx Ups TNT EMS
Payment:
T/T Paypal Visa MoneyGram Western Union