Hello Team,
i have below 2 questions
1. What is the additional advantage of having step 3a and 3b in below diagram ( data integrity is mentioned ) but can we not cover this in the step 5 with magic pattern ?
2 . is it possible to share more details regarding firewall setting for DDR ? with regards to above context and SBL handling during the boot scenario?
Regards,
Karthik