This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

TZC400 configuration on ls1046ardb

Hi,
Can anyone help me with steps on how to configure TZASC on LS1046ArmV8 ? 

Thanks,
Faizan

Parents
  • Hello,

     you can follow these general  steps:  

    Determine the specific configuration requirements for your system and the desired security features you want to enable with TZASC.

    Access the TrustZone configuration options in the LS1046ArmV8 platform. This typically involves modifying the platform's device tree or configuration files.

    Locate the TZASC configuration registers or settings in the device tree or configuration files. These registers control the behavior and attributes of the address space controller.

    Configure the TZASC registers according to your desired security settings. This may include settings such as region permissions (read, write, execute), access control, memory region size, and secure/non-secure access permissions.

    Save the changes to the device tree or configuration files.

    Build and deploy the modified device tree or configuration to the LS1046ArmV8 platform. This typically involves compiling the device tree or rebuilding the system image, depending on the specific platform and configuration process.

    Test the TZASC configuration on the LS1046ArmV8 platform to ensure that it functions as intended and provides the desired security features.

Reply
  • Hello,

     you can follow these general  steps:  

    Determine the specific configuration requirements for your system and the desired security features you want to enable with TZASC.

    Access the TrustZone configuration options in the LS1046ArmV8 platform. This typically involves modifying the platform's device tree or configuration files.

    Locate the TZASC configuration registers or settings in the device tree or configuration files. These registers control the behavior and attributes of the address space controller.

    Configure the TZASC registers according to your desired security settings. This may include settings such as region permissions (read, write, execute), access control, memory region size, and secure/non-secure access permissions.

    Save the changes to the device tree or configuration files.

    Build and deploy the modified device tree or configuration to the LS1046ArmV8 platform. This typically involves compiling the device tree or rebuilding the system image, depending on the specific platform and configuration process.

    Test the TZASC configuration on the LS1046ArmV8 platform to ensure that it functions as intended and provides the desired security features.

Children