We are running a survey to help us improve the experience for all of our members. If you see the survey appear, please take the time to tell us about your experience if you can.
I''ll take the second part of your question first....There is no "TrustZone disable bit" in a processor which implements TrustZone (or ARM Security Extensions to give it its full title). Basically because what TrustZone provides (seperation of memory spaces and execution environments) isn't the kind of thing that you easily turn on/off. That doesn't of course mean you have to actively use, and in many designs it won't be.You will, however, probably see a number of TrustZone related fuses in a design. For example, a fuse used to disable debug of the Secure world in production devices. Or you might have a fuse which the boot software reads to see whether it should load the Secure OS or not....Leading us nicely back to the first part of the question :-)If you're not planning to actively use TZ you should still run your code in the Normal world. This is not just because you won;t have access to virtualization in the Secure world. So the initial boot code should always drop you into the Normal world. Question is whether it boots a secure OS first.