This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Dual A53 cluster, MMU configuration

Hello,
we have a A53 cluster with two cores, core 0 and core 1.
is there any possibility that the MMU configuration of core 1 is only done by core 0?since on core 1 a non secure application is running.

after core 0 has done the MMU setup for Core 1, it should be forbidden for core 1 to change this its MMU configuration

thanks

Majid

Parents
  • is there any possibility that the MMU configuration of core 1 is only done by core 0?

    The MMU is configured through a combination of system register settings and translation tables held in memory.

    System registers are only accessible from the owning core.  Meaning, only core 0 can access core's 0 system registers, only core 1 can access core 1's system registers.  So that part of the MMU set up, initialising the registers, can't be done by core 0 on behalf of core 1.  Core 0 could set up the tables in memory that core 1 will later use.

    Based on the questions, I think you're trying to ensure isolation of the workload on core 0 from that on core 1.  If that's right, there are some other approaches you could investigate.  For example, TrustZone and Virtualisation can both be used to provide isolation, either separately or in combination.

Reply
  • is there any possibility that the MMU configuration of core 1 is only done by core 0?

    The MMU is configured through a combination of system register settings and translation tables held in memory.

    System registers are only accessible from the owning core.  Meaning, only core 0 can access core's 0 system registers, only core 1 can access core 1's system registers.  So that part of the MMU set up, initialising the registers, can't be done by core 0 on behalf of core 1.  Core 0 could set up the tables in memory that core 1 will later use.

    Based on the questions, I think you're trying to ensure isolation of the workload on core 0 from that on core 1.  If that's right, there are some other approaches you could investigate.  For example, TrustZone and Virtualisation can both be used to provide isolation, either separately or in combination.

Children