www.ti.com
SRIO Functional Description
Figure 17. Message Request Packet
n*64+64
PHY | TRA | LOG | TRA | LOG | PHY |
10 | 2 | 4 | 16 | n*64+16 | 16 |
acklD rsv prio
tt
ftype destID sourcelD msglen ssize letter mbox msgseg/xmbox | ... |
5 | 3 | 2 | 2 | 4 | 8 | 8 | 4 | 4 | 2 | 2 | 4 | 64 | 64 | 64 | 64 | 16 |
ftype=1011
This enables the letter and mailbox fields to instead allow four concurrent
There are 32 programmable
The mapping table entry also provides a security feature to enable or disable access from specific external devices to local mailboxes. The sourceID field indicates which external device has access to the mapping entry and corresponding queue. A compare is performed between the sourceID of the incoming message packet and each relevant mailbox/letter table mapping entry SOURCEID field. If they do not match, an ERROR response is sent back to the sender, and the transaction is logged in the logical layer error management capture registers, which sets an interrupt. A PROMISCUOUS bit allows this security feature to be disabled. When the PROMISCUOUS bit is set, full access to the mapping entry from any sourceID is allowed. Note that when the PROMISCUOUS bit is set, the mailbox/letter and corresponding mask bits are still in effect. When the PROMISCUOUS bit is cleared, it equals a mask value of FFFFh, and only a request with the matching sourceID is allowed access to the mailbox.
Each table entry also indicates if it used for single or
SPRUE13A | Serial RapidIO (SRIO) | 45 |