diff options
author | Harry Liebel <Harry.Liebel@arm.com> | 2014-04-01 19:28:07 +0100 |
---|---|---|
committer | Harry Liebel <Harry.Liebel@arm.com> | 2014-04-24 19:34:01 +0100 |
commit | ce19cf1bb56cfa72155b0c7f5d6c07bbf6efc11f (patch) | |
tree | 850417aea3a8bd5bba14bcce4cb2097ad3c1b725 /docs/porting-guide.md | |
parent | f2199d95d931826be7f87af0935ac536812d0488 (diff) |
FVP secure memory support documentation
Fixes ARM-software/tf-issues#64
Change-Id: I4e56c25f9dc7f486fbf6fa2f7d8253874119b989
Diffstat (limited to 'docs/porting-guide.md')
-rw-r--r-- | docs/porting-guide.md | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/docs/porting-guide.md b/docs/porting-guide.md index 868eb338..8a024d8b 100644 --- a/docs/porting-guide.md +++ b/docs/porting-guide.md @@ -630,6 +630,10 @@ The non-secure memory extents used for loading BL3-3 are also initialized in this function. This information is accessible in the `bl33_meminfo` field in the `bl31_args` structure pointed to by `bl2_to_bl31_args`. +Platform security components are configured if required. For the Base FVP the +TZC-400 TrustZone controller is configured to grant secure and non-secure access +to DRAM. + This function is also responsible for initializing the storage abstraction layer which is used to load further bootloader images. |