blob: 2f31906d836af646d708fd3897eeef8acfb22d25 [file] [log] [blame]
Varun Wadekarcd5a2f52015-09-20 15:08:22 +05301/*
Harvey Hsiehb9b374f2016-11-15 22:04:51 +08002 * Copyright (c) 2015-2017, ARM Limited and Contributors. All rights reserved.
Varun Wadekar8b1c0042019-09-05 08:17:02 -07003 * Copyright (c) 2019, NVIDIA Corporation. All rights reserved.
Varun Wadekarcd5a2f52015-09-20 15:08:22 +05304 *
dp-armfa3cf0b2017-05-03 09:38:09 +01005 * SPDX-License-Identifier: BSD-3-Clause
Varun Wadekarcd5a2f52015-09-20 15:08:22 +05306 */
7
Varun Wadekarcd5a2f52015-09-20 15:08:22 +05308#include <assert.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +00009#include <string.h>
10
11#include <arch_helpers.h>
12#include <common/bl_common.h>
13#include <common/debug.h>
14#include <lib/mmio.h>
15#include <lib/utils.h>
16#include <lib/xlat_tables/xlat_tables_v2.h>
17
Varun Wadekarcd5a2f52015-09-20 15:08:22 +053018#include <mce.h>
19#include <memctrl.h>
20#include <memctrl_v2.h>
Varun Wadekar87e44ff2016-03-03 13:22:39 -080021#include <smmu.h>
Varun Wadekarcd5a2f52015-09-20 15:08:22 +053022#include <tegra_def.h>
Varun Wadekare81177d2016-07-18 17:43:41 -070023#include <tegra_platform.h>
Varun Wadekarcd5a2f52015-09-20 15:08:22 +053024
25/* Video Memory base and size (live values) */
26static uint64_t video_mem_base;
Varun Wadekar7058aee2016-04-25 09:01:46 -070027static uint64_t video_mem_size_mb;
Varun Wadekarcd5a2f52015-09-20 15:08:22 +053028
Varun Wadekarcd5a2f52015-09-20 15:08:22 +053029/*
Varun Wadekarf3cd5092017-10-30 14:35:17 -070030 * The following platform setup functions are weakly defined. They
31 * provide typical implementations that will be overridden by a SoC.
32 */
33#pragma weak plat_memctrl_tzdram_setup
Steven Kaoa457f2e2017-11-14 18:52:05 +080034
Varun Wadekarf3cd5092017-10-30 14:35:17 -070035void plat_memctrl_tzdram_setup(uint64_t phys_base, uint64_t size_in_bytes)
36{
37 ; /* do nothing */
38}
39
40/*
Varun Wadekar87e44ff2016-03-03 13:22:39 -080041 * Init Memory controller during boot.
Varun Wadekarcd5a2f52015-09-20 15:08:22 +053042 */
43void tegra_memctrl_setup(void)
44{
45 uint32_t val;
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +053046 const uint32_t *mc_streamid_override_regs;
47 uint32_t num_streamid_override_regs;
48 const mc_streamid_security_cfg_t *mc_streamid_sec_cfgs;
49 uint32_t num_streamid_sec_cfgs;
Anthony Zhou0844b972017-06-28 16:35:54 +080050 const tegra_mc_settings_t *plat_mc_settings = tegra_get_mc_settings();
Varun Wadekarad45ef72017-04-03 13:44:57 -070051 uint32_t i;
Varun Wadekarcd5a2f52015-09-20 15:08:22 +053052
53 INFO("Tegra Memory Controller (v2)\n");
54
55 /* Program the SMMU pagesize */
Varun Wadekar87e44ff2016-03-03 13:22:39 -080056 tegra_smmu_init();
Varun Wadekarcba05292017-11-29 17:14:24 -080057
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +053058 /* Get the settings from the platform */
Anthony Zhou4408e882017-07-07 14:29:51 +080059 assert(plat_mc_settings != NULL);
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +053060 mc_streamid_override_regs = plat_mc_settings->streamid_override_cfg;
61 num_streamid_override_regs = plat_mc_settings->num_streamid_override_cfgs;
62 mc_streamid_sec_cfgs = plat_mc_settings->streamid_security_cfg;
63 num_streamid_sec_cfgs = plat_mc_settings->num_streamid_security_cfgs;
Varun Wadekarcd5a2f52015-09-20 15:08:22 +053064
65 /* Program all the Stream ID overrides */
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +053066 for (i = 0; i < num_streamid_override_regs; i++)
67 tegra_mc_streamid_write_32(mc_streamid_override_regs[i],
Varun Wadekarcd5a2f52015-09-20 15:08:22 +053068 MC_STREAM_ID_MAX);
69
70 /* Program the security config settings for all Stream IDs */
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +053071 for (i = 0; i < num_streamid_sec_cfgs; i++) {
72 val = mc_streamid_sec_cfgs[i].override_enable << 16 |
73 mc_streamid_sec_cfgs[i].override_client_inputs << 8 |
74 mc_streamid_sec_cfgs[i].override_client_ns_flag << 0;
75 tegra_mc_streamid_write_32(mc_streamid_sec_cfgs[i].offset, val);
Varun Wadekarcd5a2f52015-09-20 15:08:22 +053076 }
77
78 /*
79 * All requests at boot time, and certain requests during
80 * normal run time, are physically addressed and must bypass
81 * the SMMU. The client hub logic implements a hardware bypass
82 * path around the Translation Buffer Units (TBU). During
83 * boot-time, the SMMU_BYPASS_CTRL register (which defaults to
84 * TBU_BYPASS mode) will be used to steer all requests around
85 * the uninitialized TBUs. During normal operation, this register
86 * is locked into TBU_BYPASS_SID config, which routes requests
87 * with special StreamID 0x7f on the bypass path and all others
88 * through the selected TBU. This is done to disable SMMU Bypass
89 * mode, as it could be used to circumvent SMMU security checks.
90 */
91 tegra_mc_write_32(MC_SMMU_BYPASS_CONFIG,
Pritesh Raithatha9eb5db52017-01-02 19:42:31 +053092 MC_SMMU_BYPASS_CONFIG_SETTINGS);
Varun Wadekarcd5a2f52015-09-20 15:08:22 +053093
Varun Wadekarc9ac3e42016-02-17 15:07:49 -080094 /*
Varun Wadekara0f26972016-03-11 17:18:51 -080095 * Re-configure MSS to allow ROC to deal with ordering of the
96 * Memory Controller traffic. This is needed as the Memory Controller
97 * boots with MSS having all control, but ROC provides a performance
98 * boost as compared to MSS.
99 */
Puneet Saxenacf8c0e22017-08-04 17:19:55 +0530100 if (plat_mc_settings->reconfig_mss_clients != NULL) {
101 plat_mc_settings->reconfig_mss_clients();
102 }
Varun Wadekara0f26972016-03-11 17:18:51 -0800103
Varun Wadekarad45ef72017-04-03 13:44:57 -0700104 /* Program overrides for MC transactions */
Puneet Saxenacf8c0e22017-08-04 17:19:55 +0530105 if (plat_mc_settings->set_txn_overrides != NULL) {
106 plat_mc_settings->set_txn_overrides();
107 }
Varun Wadekar87e44ff2016-03-03 13:22:39 -0800108}
Varun Wadekarc9ac3e42016-02-17 15:07:49 -0800109
Varun Wadekar87e44ff2016-03-03 13:22:39 -0800110/*
111 * Restore Memory Controller settings after "System Suspend"
112 */
113void tegra_memctrl_restore_settings(void)
114{
Puneet Saxenacf8c0e22017-08-04 17:19:55 +0530115 const tegra_mc_settings_t *plat_mc_settings = tegra_get_mc_settings();
116
117 assert(plat_mc_settings != NULL);
118
Varun Wadekara0f26972016-03-11 17:18:51 -0800119 /*
120 * Re-configure MSS to allow ROC to deal with ordering of the
121 * Memory Controller traffic. This is needed as the Memory Controller
122 * resets during System Suspend with MSS having all control, but ROC
123 * provides a performance boost as compared to MSS.
124 */
Puneet Saxenacf8c0e22017-08-04 17:19:55 +0530125 if (plat_mc_settings->reconfig_mss_clients != NULL) {
126 plat_mc_settings->reconfig_mss_clients();
127 }
Varun Wadekara0f26972016-03-11 17:18:51 -0800128
Varun Wadekarad45ef72017-04-03 13:44:57 -0700129 /* Program overrides for MC transactions */
Puneet Saxenacf8c0e22017-08-04 17:19:55 +0530130 if (plat_mc_settings->set_txn_overrides != NULL) {
131 plat_mc_settings->set_txn_overrides();
132 }
Varun Wadekarad45ef72017-04-03 13:44:57 -0700133
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530134 /* video memory carveout region */
Anthony Zhou0e07e452017-07-26 17:16:54 +0800135 if (video_mem_base != 0ULL) {
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530136 tegra_mc_write_32(MC_VIDEO_PROTECT_BASE_LO,
137 (uint32_t)video_mem_base);
138 tegra_mc_write_32(MC_VIDEO_PROTECT_BASE_HI,
139 (uint32_t)(video_mem_base >> 32));
Varun Wadekar7058aee2016-04-25 09:01:46 -0700140 tegra_mc_write_32(MC_VIDEO_PROTECT_SIZE_MB, video_mem_size_mb);
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530141
142 /*
Varun Wadekar153982c2016-12-21 14:50:18 -0800143 * MCE propagates the VideoMem configuration values across the
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530144 * CCPLEX.
145 */
146 mce_update_gsc_videomem();
147 }
148}
149
150/*
151 * Secure the BL31 DRAM aperture.
152 *
153 * phys_base = physical base of TZDRAM aperture
154 * size_in_bytes = size of aperture in bytes
155 */
156void tegra_memctrl_tzdram_setup(uint64_t phys_base, uint32_t size_in_bytes)
157{
158 /*
Varun Wadekarf3cd5092017-10-30 14:35:17 -0700159 * Perform platform specific steps.
Harvey Hsiehc95802d2016-07-29 20:10:59 +0800160 */
Varun Wadekarf3cd5092017-10-30 14:35:17 -0700161 plat_memctrl_tzdram_setup(phys_base, size_in_bytes);
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530162}
163
164/*
Varun Wadekar13e7dc42015-12-30 15:15:08 -0800165 * Secure the BL31 TZRAM aperture.
166 *
167 * phys_base = physical base of TZRAM aperture
168 * size_in_bytes = size of aperture in bytes
169 */
170void tegra_memctrl_tzram_setup(uint64_t phys_base, uint32_t size_in_bytes)
171{
Varun Wadekare6d43222016-05-25 16:35:04 -0700172 uint32_t index;
173 uint32_t total_128kb_blocks = size_in_bytes >> 17;
Varun Wadekar153982c2016-12-21 14:50:18 -0800174 uint32_t residual_4kb_blocks = (size_in_bytes & (uint32_t)0x1FFFF) >> 12;
Varun Wadekar13e7dc42015-12-30 15:15:08 -0800175 uint32_t val;
176
Varun Wadekar153982c2016-12-21 14:50:18 -0800177 INFO("Configuring TrustZone SRAM Memory Carveout\n");
178
Varun Wadekar13e7dc42015-12-30 15:15:08 -0800179 /*
Varun Wadekare6d43222016-05-25 16:35:04 -0700180 * Reset the access configuration registers to restrict access
181 * to the TZRAM aperture
Varun Wadekar13e7dc42015-12-30 15:15:08 -0800182 */
Steven Kaob688d382017-09-06 13:32:21 +0800183 for (index = MC_TZRAM_CLIENT_ACCESS0_CFG0;
Varun Wadekar153982c2016-12-21 14:50:18 -0800184 index < ((uint32_t)MC_TZRAM_CARVEOUT_CFG + (uint32_t)MC_GSC_CONFIG_REGS_SIZE);
185 index += 4U) {
Varun Wadekare6d43222016-05-25 16:35:04 -0700186 tegra_mc_write_32(index, 0);
Varun Wadekar153982c2016-12-21 14:50:18 -0800187 }
Varun Wadekar13e7dc42015-12-30 15:15:08 -0800188
189 /*
Steven Kaob688d382017-09-06 13:32:21 +0800190 * Enable CPU access configuration registers to access the TZRAM aperture
191 */
192 if (!tegra_chipid_is_t186()) {
193 val = tegra_mc_read_32(MC_TZRAM_CLIENT_ACCESS1_CFG0);
194 val |= TZRAM_ALLOW_MPCORER | TZRAM_ALLOW_MPCOREW;
195 tegra_mc_write_32(MC_TZRAM_CLIENT_ACCESS1_CFG0, val);
196 }
197
198 /*
Varun Wadekare6d43222016-05-25 16:35:04 -0700199 * Set the TZRAM base. TZRAM base must be 4k aligned, at least.
200 */
Varun Wadekar153982c2016-12-21 14:50:18 -0800201 assert((phys_base & (uint64_t)0xFFF) == 0U);
Varun Wadekare6d43222016-05-25 16:35:04 -0700202 tegra_mc_write_32(MC_TZRAM_BASE_LO, (uint32_t)phys_base);
203 tegra_mc_write_32(MC_TZRAM_BASE_HI,
Varun Wadekar153982c2016-12-21 14:50:18 -0800204 (uint32_t)(phys_base >> 32) & MC_GSC_BASE_HI_MASK);
Varun Wadekar13e7dc42015-12-30 15:15:08 -0800205
Varun Wadekare6d43222016-05-25 16:35:04 -0700206 /*
207 * Set the TZRAM size
208 *
209 * total size = (number of 128KB blocks) + (number of remaining 4KB
210 * blocks)
211 *
212 */
Varun Wadekar153982c2016-12-21 14:50:18 -0800213 val = (residual_4kb_blocks << MC_GSC_SIZE_RANGE_4KB_SHIFT) |
Varun Wadekare6d43222016-05-25 16:35:04 -0700214 total_128kb_blocks;
215 tegra_mc_write_32(MC_TZRAM_SIZE, val);
Varun Wadekar13e7dc42015-12-30 15:15:08 -0800216
Varun Wadekare6d43222016-05-25 16:35:04 -0700217 /*
218 * Lock the configuration settings by disabling TZ-only lock
219 * and locking the configuration against any future changes
220 * at all.
221 */
222 val = tegra_mc_read_32(MC_TZRAM_CARVEOUT_CFG);
Anthony Zhou0844b972017-06-28 16:35:54 +0800223 val &= (uint32_t)~MC_GSC_ENABLE_TZ_LOCK_BIT;
Varun Wadekar153982c2016-12-21 14:50:18 -0800224 val |= MC_GSC_LOCK_CFG_SETTINGS_BIT;
Steven Kaob688d382017-09-06 13:32:21 +0800225 if (!tegra_chipid_is_t186()) {
226 val |= MC_GSC_ENABLE_CPU_SECURE_BIT;
227 }
Varun Wadekare6d43222016-05-25 16:35:04 -0700228 tegra_mc_write_32(MC_TZRAM_CARVEOUT_CFG, val);
Varun Wadekar13e7dc42015-12-30 15:15:08 -0800229
230 /*
Varun Wadekar153982c2016-12-21 14:50:18 -0800231 * MCE propagates the security configuration values across the
Varun Wadekar13e7dc42015-12-30 15:15:08 -0800232 * CCPLEX.
233 */
234 mce_update_gsc_tzram();
235}
236
Varun Wadekar153982c2016-12-21 14:50:18 -0800237static void tegra_lock_videomem_nonoverlap(uint64_t phys_base,
238 uint64_t size_in_bytes)
239{
240 uint32_t index;
241 uint64_t total_128kb_blocks = size_in_bytes >> 17;
242 uint64_t residual_4kb_blocks = (size_in_bytes & (uint32_t)0x1FFFF) >> 12;
243 uint64_t val;
244
245 /*
246 * Reset the access configuration registers to restrict access to
247 * old Videomem aperture
248 */
249 for (index = MC_VIDEO_PROTECT_CLEAR_ACCESS_CFG0;
250 index < ((uint32_t)MC_VIDEO_PROTECT_CLEAR_ACCESS_CFG0 + (uint32_t)MC_GSC_CONFIG_REGS_SIZE);
251 index += 4U) {
252 tegra_mc_write_32(index, 0);
253 }
254
255 /*
256 * Set the base. It must be 4k aligned, at least.
257 */
258 assert((phys_base & (uint64_t)0xFFF) == 0U);
259 tegra_mc_write_32(MC_VIDEO_PROTECT_CLEAR_BASE_LO, (uint32_t)phys_base);
260 tegra_mc_write_32(MC_VIDEO_PROTECT_CLEAR_BASE_HI,
261 (uint32_t)(phys_base >> 32) & (uint32_t)MC_GSC_BASE_HI_MASK);
262
263 /*
264 * Set the aperture size
265 *
266 * total size = (number of 128KB blocks) + (number of remaining 4KB
267 * blocks)
268 *
269 */
270 val = (uint32_t)((residual_4kb_blocks << MC_GSC_SIZE_RANGE_4KB_SHIFT) |
271 total_128kb_blocks);
272 tegra_mc_write_32(MC_VIDEO_PROTECT_CLEAR_SIZE, (uint32_t)val);
273
274 /*
275 * Lock the configuration settings by enabling TZ-only lock and
276 * locking the configuration against any future changes from NS
277 * world.
278 */
279 tegra_mc_write_32(MC_VIDEO_PROTECT_CLEAR_CFG,
280 (uint32_t)MC_GSC_ENABLE_TZ_LOCK_BIT);
281
282 /*
283 * MCE propagates the GSC configuration values across the
284 * CCPLEX.
285 */
286}
287
288static void tegra_unlock_videomem_nonoverlap(void)
289{
290 /* Clear the base */
291 tegra_mc_write_32(MC_VIDEO_PROTECT_CLEAR_BASE_LO, 0);
292 tegra_mc_write_32(MC_VIDEO_PROTECT_CLEAR_BASE_HI, 0);
293
294 /* Clear the size */
295 tegra_mc_write_32(MC_VIDEO_PROTECT_CLEAR_SIZE, 0);
296}
297
298static void tegra_clear_videomem(uintptr_t non_overlap_area_start,
299 unsigned long long non_overlap_area_size)
300{
Varun Wadekar117a2e02017-08-03 11:40:34 -0700301 int ret;
302
Varun Wadekar153982c2016-12-21 14:50:18 -0800303 /*
304 * Map the NS memory first, clean it and then unmap it.
305 */
Varun Wadekar117a2e02017-08-03 11:40:34 -0700306 ret = mmap_add_dynamic_region(non_overlap_area_start, /* PA */
Varun Wadekar153982c2016-12-21 14:50:18 -0800307 non_overlap_area_start, /* VA */
308 non_overlap_area_size, /* size */
309 MT_NS | MT_RW | MT_EXECUTE_NEVER); /* attrs */
Varun Wadekar117a2e02017-08-03 11:40:34 -0700310 assert(ret == 0);
Varun Wadekar153982c2016-12-21 14:50:18 -0800311
312 zero_normalmem((void *)non_overlap_area_start, non_overlap_area_size);
313 flush_dcache_range(non_overlap_area_start, non_overlap_area_size);
314
Anthony Zhou0844b972017-06-28 16:35:54 +0800315 (void)mmap_remove_dynamic_region(non_overlap_area_start,
Varun Wadekar153982c2016-12-21 14:50:18 -0800316 non_overlap_area_size);
317}
318
Varun Wadekar13e7dc42015-12-30 15:15:08 -0800319/*
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530320 * Program the Video Memory carveout region
321 *
322 * phys_base = physical base of aperture
323 * size_in_bytes = size of aperture in bytes
324 */
325void tegra_memctrl_videomem_setup(uint64_t phys_base, uint32_t size_in_bytes)
326{
Varun Wadekar153982c2016-12-21 14:50:18 -0800327 uintptr_t vmem_end_old = video_mem_base + (video_mem_size_mb << 20);
328 uintptr_t vmem_end_new = phys_base + size_in_bytes;
Varun Wadekar153982c2016-12-21 14:50:18 -0800329 unsigned long long non_overlap_area_size;
Varun Wadekare60f1bf2016-02-17 10:10:50 -0800330
331 /*
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530332 * Setup the Memory controller to restrict CPU accesses to the Video
333 * Memory region
334 */
335 INFO("Configuring Video Memory Carveout\n");
336
Varun Wadekar153982c2016-12-21 14:50:18 -0800337 /*
338 * Configure Memory Controller directly for the first time.
339 */
340 if (video_mem_base == 0U)
341 goto done;
342
343 /*
344 * Lock the non overlapping memory being cleared so that other masters
345 * do not accidently write to it. The memory would be unlocked once
346 * the non overlapping region is cleared and the new memory
347 * settings take effect.
348 */
349 tegra_lock_videomem_nonoverlap(video_mem_base,
350 video_mem_size_mb << 20);
351
352 /*
353 * Clear the old regions now being exposed. The following cases
354 * can occur -
355 *
356 * 1. clear whole old region (no overlap with new region)
357 * 2. clear old sub-region below new base
358 * 3. clear old sub-region above new end
359 */
360 INFO("Cleaning previous Video Memory Carveout\n");
361
Anthony Zhou0844b972017-06-28 16:35:54 +0800362 if ((phys_base > vmem_end_old) || (video_mem_base > vmem_end_new)) {
Varun Wadekar153982c2016-12-21 14:50:18 -0800363 tegra_clear_videomem(video_mem_base,
Varun Wadekar8b1c0042019-09-05 08:17:02 -0700364 video_mem_size_mb << 20U);
Varun Wadekar153982c2016-12-21 14:50:18 -0800365 } else {
366 if (video_mem_base < phys_base) {
367 non_overlap_area_size = phys_base - video_mem_base;
Varun Wadekar8b1c0042019-09-05 08:17:02 -0700368 tegra_clear_videomem(video_mem_base, non_overlap_area_size);
Varun Wadekar153982c2016-12-21 14:50:18 -0800369 }
370 if (vmem_end_old > vmem_end_new) {
371 non_overlap_area_size = vmem_end_old - vmem_end_new;
Varun Wadekar8b1c0042019-09-05 08:17:02 -0700372 tegra_clear_videomem(vmem_end_new, non_overlap_area_size);
Varun Wadekar153982c2016-12-21 14:50:18 -0800373 }
374 }
375
376done:
377 /* program the Videomem aperture */
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530378 tegra_mc_write_32(MC_VIDEO_PROTECT_BASE_LO, (uint32_t)phys_base);
379 tegra_mc_write_32(MC_VIDEO_PROTECT_BASE_HI,
380 (uint32_t)(phys_base >> 32));
Varun Wadekar7058aee2016-04-25 09:01:46 -0700381 tegra_mc_write_32(MC_VIDEO_PROTECT_SIZE_MB, size_in_bytes >> 20);
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530382
Varun Wadekar153982c2016-12-21 14:50:18 -0800383 /* unlock the previous locked nonoverlapping aperture */
384 tegra_unlock_videomem_nonoverlap();
385
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530386 /* store new values */
387 video_mem_base = phys_base;
Varun Wadekar7058aee2016-04-25 09:01:46 -0700388 video_mem_size_mb = size_in_bytes >> 20;
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530389
390 /*
Varun Wadekar153982c2016-12-21 14:50:18 -0800391 * MCE propagates the VideoMem configuration values across the
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530392 * CCPLEX.
393 */
394 mce_update_gsc_videomem();
395}
Varun Wadekarc92050b2017-03-29 14:57:29 -0700396
397/*
398 * This feature exists only for v1 of the Tegra Memory Controller.
399 */
400void tegra_memctrl_disable_ahb_redirection(void)
401{
402 ; /* do nothing */
403}
Harvey Hsieh359be952017-08-21 15:01:53 +0800404
405void tegra_memctrl_clear_pending_interrupts(void)
406{
407 ; /* do nothing */
408}