[sram_ctrl/dv] Some small fixes on tl_error test

1. `tl_mem_access_gated` should only apply to mem access
2. Remove some unnecessary code in sram_ctrl_common_vseq and enable running csr_rw with
passthrough_tl_intg_err.

Signed-off-by: Weicai Yang <weicai@google.com>
diff --git a/hw/dv/sv/cip_lib/cip_base_scoreboard.sv b/hw/dv/sv/cip_lib/cip_base_scoreboard.sv
index 34d7162..aa887c4 100644
--- a/hw/dv/sv/cip_lib/cip_base_scoreboard.sv
+++ b/hw/dv/sv/cip_lib/cip_base_scoreboard.sv
@@ -391,10 +391,13 @@
 
     mem_access_err = !is_tl_mem_access_allowed(item, ral_name, mem_byte_access_err, mem_wo_err,
                                                mem_ro_err, custom_err);
-    if (mem_access_err || cfg.tl_mem_access_gated) begin
+    if (mem_access_err) begin
       // Some memory implementations may not return an error response on invalid accesses.
-      exp_d_error |= mem_byte_access_err | mem_wo_err | mem_ro_err | custom_err |
-                     cfg.tl_mem_access_gated;
+      exp_d_error |= mem_byte_access_err | mem_wo_err | mem_ro_err | custom_err;
+    end
+
+    if (is_mem_addr(item, ral_name) && cfg.tl_mem_access_gated) begin
+      exp_d_error |= cfg.tl_mem_access_gated;
     end
 
     bus_intg_err = !item.is_a_chan_intg_ok(.throw_error(0));
diff --git a/hw/ip/sram_ctrl/dv/env/seq_lib/sram_ctrl_common_vseq.sv b/hw/ip/sram_ctrl/dv/env/seq_lib/sram_ctrl_common_vseq.sv
index b4bd9f6..14e082f 100644
--- a/hw/ip/sram_ctrl/dv/env/seq_lib/sram_ctrl_common_vseq.sv
+++ b/hw/ip/sram_ctrl/dv/env/seq_lib/sram_ctrl_common_vseq.sv
@@ -46,14 +46,6 @@
     end
 
     super.pre_start();
-
-    // After init, init_done is set. If scb is off, update predict value here
-    if (!cfg.en_scb && do_sram_ctrl_init) begin
-      void'(ral.status.init_done.predict(.value(1), .kind(UVM_PREDICT_READ)));
-    end
-
-    // disable running csr_vseq, as we do sram_ctrl_init which affects several CSRs' values
-    en_csr_vseq_w_passthru_mem_intg = 0;
   endtask
 
   virtual task body();
@@ -78,7 +70,7 @@
   endfunction
 
   // Check internal key/nonce are reset to default
-  // Check sram access is blocked after a fault injection
+  // Check sram access returns d_error after a fault injection
   virtual task check_sram_access_blocked_after_fi();
     otp_ctrl_pkg::sram_key_t internal_key;
     otp_ctrl_pkg::sram_nonce_t internal_nonce;
@@ -105,8 +97,7 @@
     end
   endfunction
 
-  // Check alert and `status.init_error` is set.
-  // After injecting faults, reading any address should return 0. #10909
+  // Check alert and the corresponding status bit is set.
   virtual task check_sec_cm_fi_resp(sec_cm_base_if_proxy if_proxy);
     bit [TL_AW-1:0]  addr;
     bit [TL_DBW-1:0] mask;