Skip to content
Commit bd5eccc8 authored by Vijayenthiran Subramaniam's avatar Vijayenthiran Subramaniam
Browse files

rdn2cfg2/run_models: bypass trustzone controller (TZC) at lauch



FVP by default blocks all the transaction if trustzone controller (TZC)
is not configured by software. This is an opposite behaviour to hardware
which allows all access if the TZC is not configured by software. To
align with hardware behaviour, use model parameters to configure TZC to
be bypassed and allow all access until software reconfigures the TZC.

Signed-off-by: Vijayenthiran Subramaniam's avatarVijayenthiran Subramaniam <vijayenthiran.subramaniam@arm.com>
Change-Id: I4f5c22bce7fb1f6067c394db21b5329a439dd666
parent fba8d5ca
Loading
Loading
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment