blob: fb57b2b74decdfcf15a120f50e1a5d97404093ad [file] [log] [blame]
Varun Wadekarcd5a2f52015-09-20 15:08:22 +05301/*
Varun Wadekar13e7dc42015-12-30 15:15:08 -08002 * Copyright (c) 2015-2016, ARM Limited and Contributors. All rights reserved.
Varun Wadekarcd5a2f52015-09-20 15:08:22 +05303 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are met:
6 *
7 * Redistributions of source code must retain the above copyright notice, this
8 * list of conditions and the following disclaimer.
9 *
10 * Redistributions in binary form must reproduce the above copyright notice,
11 * this list of conditions and the following disclaimer in the documentation
12 * and/or other materials provided with the distribution.
13 *
14 * Neither the name of ARM nor the names of its contributors may be used
15 * to endorse or promote products derived from this software without specific
16 * prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28 * POSSIBILITY OF SUCH DAMAGE.
29 */
30
31#include <arch_helpers.h>
32#include <assert.h>
33#include <debug.h>
34#include <mce.h>
35#include <memctrl.h>
36#include <memctrl_v2.h>
37#include <mmio.h>
Varun Wadekar87e44ff2016-03-03 13:22:39 -080038#include <smmu.h>
Varun Wadekarcd5a2f52015-09-20 15:08:22 +053039#include <string.h>
40#include <tegra_def.h>
Varun Wadekare81177d2016-07-18 17:43:41 -070041#include <tegra_platform.h>
Varun Wadekarcd5a2f52015-09-20 15:08:22 +053042#include <xlat_tables.h>
43
Varun Wadekare60f1bf2016-02-17 10:10:50 -080044#define TEGRA_GPU_RESET_REG_OFFSET 0x30
45#define GPU_RESET_BIT (1 << 0)
46
Varun Wadekarcd5a2f52015-09-20 15:08:22 +053047/* Video Memory base and size (live values) */
48static uint64_t video_mem_base;
Varun Wadekar7058aee2016-04-25 09:01:46 -070049static uint64_t video_mem_size_mb;
Varun Wadekarcd5a2f52015-09-20 15:08:22 +053050
51/* array to hold stream_id override config register offsets */
52const static uint32_t streamid_overrides[] = {
53 MC_STREAMID_OVERRIDE_CFG_PTCR,
54 MC_STREAMID_OVERRIDE_CFG_AFIR,
55 MC_STREAMID_OVERRIDE_CFG_HDAR,
56 MC_STREAMID_OVERRIDE_CFG_HOST1XDMAR,
57 MC_STREAMID_OVERRIDE_CFG_NVENCSRD,
58 MC_STREAMID_OVERRIDE_CFG_SATAR,
59 MC_STREAMID_OVERRIDE_CFG_MPCORER,
60 MC_STREAMID_OVERRIDE_CFG_NVENCSWR,
61 MC_STREAMID_OVERRIDE_CFG_AFIW,
62 MC_STREAMID_OVERRIDE_CFG_SATAW,
63 MC_STREAMID_OVERRIDE_CFG_MPCOREW,
64 MC_STREAMID_OVERRIDE_CFG_SATAW,
65 MC_STREAMID_OVERRIDE_CFG_HDAW,
66 MC_STREAMID_OVERRIDE_CFG_ISPRA,
67 MC_STREAMID_OVERRIDE_CFG_ISPWA,
68 MC_STREAMID_OVERRIDE_CFG_ISPWB,
69 MC_STREAMID_OVERRIDE_CFG_XUSB_HOSTR,
70 MC_STREAMID_OVERRIDE_CFG_XUSB_HOSTW,
71 MC_STREAMID_OVERRIDE_CFG_XUSB_DEVR,
72 MC_STREAMID_OVERRIDE_CFG_XUSB_DEVW,
73 MC_STREAMID_OVERRIDE_CFG_TSECSRD,
74 MC_STREAMID_OVERRIDE_CFG_TSECSWR,
75 MC_STREAMID_OVERRIDE_CFG_GPUSRD,
76 MC_STREAMID_OVERRIDE_CFG_GPUSWR,
77 MC_STREAMID_OVERRIDE_CFG_SDMMCRA,
78 MC_STREAMID_OVERRIDE_CFG_SDMMCRAA,
79 MC_STREAMID_OVERRIDE_CFG_SDMMCR,
80 MC_STREAMID_OVERRIDE_CFG_SDMMCRAB,
81 MC_STREAMID_OVERRIDE_CFG_SDMMCWA,
82 MC_STREAMID_OVERRIDE_CFG_SDMMCWAA,
83 MC_STREAMID_OVERRIDE_CFG_SDMMCW,
84 MC_STREAMID_OVERRIDE_CFG_SDMMCWAB,
85 MC_STREAMID_OVERRIDE_CFG_VICSRD,
86 MC_STREAMID_OVERRIDE_CFG_VICSWR,
87 MC_STREAMID_OVERRIDE_CFG_VIW,
88 MC_STREAMID_OVERRIDE_CFG_NVDECSRD,
89 MC_STREAMID_OVERRIDE_CFG_NVDECSWR,
90 MC_STREAMID_OVERRIDE_CFG_APER,
91 MC_STREAMID_OVERRIDE_CFG_APEW,
92 MC_STREAMID_OVERRIDE_CFG_NVJPGSRD,
93 MC_STREAMID_OVERRIDE_CFG_NVJPGSWR,
94 MC_STREAMID_OVERRIDE_CFG_SESRD,
95 MC_STREAMID_OVERRIDE_CFG_SESWR,
96 MC_STREAMID_OVERRIDE_CFG_ETRR,
97 MC_STREAMID_OVERRIDE_CFG_ETRW,
98 MC_STREAMID_OVERRIDE_CFG_TSECSRDB,
99 MC_STREAMID_OVERRIDE_CFG_TSECSWRB,
100 MC_STREAMID_OVERRIDE_CFG_GPUSRD2,
101 MC_STREAMID_OVERRIDE_CFG_GPUSWR2,
102 MC_STREAMID_OVERRIDE_CFG_AXISR,
103 MC_STREAMID_OVERRIDE_CFG_AXISW,
104 MC_STREAMID_OVERRIDE_CFG_EQOSR,
105 MC_STREAMID_OVERRIDE_CFG_EQOSW,
106 MC_STREAMID_OVERRIDE_CFG_UFSHCR,
107 MC_STREAMID_OVERRIDE_CFG_UFSHCW,
108 MC_STREAMID_OVERRIDE_CFG_NVDISPLAYR,
109 MC_STREAMID_OVERRIDE_CFG_BPMPR,
110 MC_STREAMID_OVERRIDE_CFG_BPMPW,
111 MC_STREAMID_OVERRIDE_CFG_BPMPDMAR,
112 MC_STREAMID_OVERRIDE_CFG_BPMPDMAW,
113 MC_STREAMID_OVERRIDE_CFG_AONR,
114 MC_STREAMID_OVERRIDE_CFG_AONW,
115 MC_STREAMID_OVERRIDE_CFG_AONDMAR,
116 MC_STREAMID_OVERRIDE_CFG_AONDMAW,
117 MC_STREAMID_OVERRIDE_CFG_SCER,
118 MC_STREAMID_OVERRIDE_CFG_SCEW,
119 MC_STREAMID_OVERRIDE_CFG_SCEDMAR,
120 MC_STREAMID_OVERRIDE_CFG_SCEDMAW,
121 MC_STREAMID_OVERRIDE_CFG_APEDMAR,
122 MC_STREAMID_OVERRIDE_CFG_APEDMAW,
123 MC_STREAMID_OVERRIDE_CFG_NVDISPLAYR1,
124 MC_STREAMID_OVERRIDE_CFG_VICSRD1,
125 MC_STREAMID_OVERRIDE_CFG_NVDECSRD1
126};
127
128/* array to hold the security configs for stream IDs */
129const static mc_streamid_security_cfg_t sec_cfgs[] = {
Varun Wadekarde729d62016-02-17 10:01:28 -0800130 mc_make_sec_cfg(SCEW, NON_SECURE, NO_OVERRIDE, ENABLE),
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530131 mc_make_sec_cfg(AFIR, NON_SECURE, OVERRIDE, ENABLE),
132 mc_make_sec_cfg(NVDISPLAYR1, NON_SECURE, OVERRIDE, ENABLE),
133 mc_make_sec_cfg(XUSB_DEVR, NON_SECURE, OVERRIDE, ENABLE),
134 mc_make_sec_cfg(VICSRD1, NON_SECURE, NO_OVERRIDE, ENABLE),
135 mc_make_sec_cfg(NVENCSWR, NON_SECURE, NO_OVERRIDE, ENABLE),
136 mc_make_sec_cfg(TSECSRDB, NON_SECURE, NO_OVERRIDE, ENABLE),
137 mc_make_sec_cfg(AXISW, SECURE, NO_OVERRIDE, DISABLE),
138 mc_make_sec_cfg(SDMMCWAB, NON_SECURE, OVERRIDE, ENABLE),
Mustafa Yigit Bilgen48909aa2016-11-17 15:08:39 -0800139 mc_make_sec_cfg(AONDMAW, NON_SECURE, NO_OVERRIDE, ENABLE),
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530140 mc_make_sec_cfg(GPUSWR2, SECURE, NO_OVERRIDE, DISABLE),
141 mc_make_sec_cfg(SATAW, NON_SECURE, OVERRIDE, ENABLE),
142 mc_make_sec_cfg(UFSHCW, NON_SECURE, OVERRIDE, ENABLE),
143 mc_make_sec_cfg(AFIW, NON_SECURE, OVERRIDE, ENABLE),
144 mc_make_sec_cfg(SDMMCR, NON_SECURE, OVERRIDE, ENABLE),
Varun Wadekarde729d62016-02-17 10:01:28 -0800145 mc_make_sec_cfg(SCEDMAW, NON_SECURE, NO_OVERRIDE, ENABLE),
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530146 mc_make_sec_cfg(UFSHCR, NON_SECURE, OVERRIDE, ENABLE),
147 mc_make_sec_cfg(SDMMCWAA, NON_SECURE, OVERRIDE, ENABLE),
Varun Wadekar0012d052016-04-19 14:22:13 -0700148 mc_make_sec_cfg(SESWR, NON_SECURE, NO_OVERRIDE, ENABLE),
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530149 mc_make_sec_cfg(MPCORER, NON_SECURE, OVERRIDE, ENABLE),
150 mc_make_sec_cfg(PTCR, NON_SECURE, OVERRIDE, ENABLE),
151 mc_make_sec_cfg(BPMPW, NON_SECURE, NO_OVERRIDE, ENABLE),
152 mc_make_sec_cfg(ETRW, NON_SECURE, OVERRIDE, ENABLE),
153 mc_make_sec_cfg(GPUSRD, SECURE, NO_OVERRIDE, DISABLE),
154 mc_make_sec_cfg(VICSWR, NON_SECURE, NO_OVERRIDE, ENABLE),
Varun Wadekarde729d62016-02-17 10:01:28 -0800155 mc_make_sec_cfg(SCEDMAR, NON_SECURE, NO_OVERRIDE, ENABLE),
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530156 mc_make_sec_cfg(HDAW, NON_SECURE, OVERRIDE, ENABLE),
157 mc_make_sec_cfg(ISPWA, NON_SECURE, OVERRIDE, ENABLE),
158 mc_make_sec_cfg(EQOSW, NON_SECURE, OVERRIDE, ENABLE),
159 mc_make_sec_cfg(XUSB_HOSTW, NON_SECURE, OVERRIDE, ENABLE),
160 mc_make_sec_cfg(TSECSWR, NON_SECURE, NO_OVERRIDE, ENABLE),
161 mc_make_sec_cfg(SDMMCRAA, NON_SECURE, OVERRIDE, ENABLE),
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530162 mc_make_sec_cfg(VIW, NON_SECURE, OVERRIDE, ENABLE),
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530163 mc_make_sec_cfg(AXISR, SECURE, NO_OVERRIDE, DISABLE),
164 mc_make_sec_cfg(SDMMCW, NON_SECURE, OVERRIDE, ENABLE),
165 mc_make_sec_cfg(BPMPDMAW, NON_SECURE, NO_OVERRIDE, ENABLE),
166 mc_make_sec_cfg(ISPRA, NON_SECURE, OVERRIDE, ENABLE),
167 mc_make_sec_cfg(NVDECSWR, NON_SECURE, NO_OVERRIDE, ENABLE),
168 mc_make_sec_cfg(XUSB_DEVW, NON_SECURE, OVERRIDE, ENABLE),
169 mc_make_sec_cfg(NVDECSRD, NON_SECURE, NO_OVERRIDE, ENABLE),
170 mc_make_sec_cfg(MPCOREW, NON_SECURE, OVERRIDE, ENABLE),
171 mc_make_sec_cfg(NVDISPLAYR, NON_SECURE, OVERRIDE, ENABLE),
172 mc_make_sec_cfg(BPMPDMAR, NON_SECURE, NO_OVERRIDE, ENABLE),
173 mc_make_sec_cfg(NVJPGSWR, NON_SECURE, NO_OVERRIDE, ENABLE),
174 mc_make_sec_cfg(NVDECSRD1, NON_SECURE, NO_OVERRIDE, ENABLE),
175 mc_make_sec_cfg(TSECSRD, NON_SECURE, NO_OVERRIDE, ENABLE),
176 mc_make_sec_cfg(NVJPGSRD, NON_SECURE, NO_OVERRIDE, ENABLE),
177 mc_make_sec_cfg(SDMMCWA, NON_SECURE, OVERRIDE, ENABLE),
Varun Wadekarde729d62016-02-17 10:01:28 -0800178 mc_make_sec_cfg(SCER, NON_SECURE, NO_OVERRIDE, ENABLE),
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530179 mc_make_sec_cfg(XUSB_HOSTR, NON_SECURE, OVERRIDE, ENABLE),
180 mc_make_sec_cfg(VICSRD, NON_SECURE, NO_OVERRIDE, ENABLE),
Mustafa Yigit Bilgen48909aa2016-11-17 15:08:39 -0800181 mc_make_sec_cfg(AONDMAR, NON_SECURE, NO_OVERRIDE, ENABLE),
182 mc_make_sec_cfg(AONW, NON_SECURE, NO_OVERRIDE, ENABLE),
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530183 mc_make_sec_cfg(SDMMCRA, NON_SECURE, OVERRIDE, ENABLE),
184 mc_make_sec_cfg(HOST1XDMAR, NON_SECURE, NO_OVERRIDE, ENABLE),
185 mc_make_sec_cfg(EQOSR, NON_SECURE, OVERRIDE, ENABLE),
186 mc_make_sec_cfg(SATAR, NON_SECURE, OVERRIDE, ENABLE),
187 mc_make_sec_cfg(BPMPR, NON_SECURE, NO_OVERRIDE, ENABLE),
188 mc_make_sec_cfg(HDAR, NON_SECURE, OVERRIDE, ENABLE),
189 mc_make_sec_cfg(SDMMCRAB, NON_SECURE, OVERRIDE, ENABLE),
190 mc_make_sec_cfg(ETRR, NON_SECURE, OVERRIDE, ENABLE),
Mustafa Yigit Bilgen48909aa2016-11-17 15:08:39 -0800191 mc_make_sec_cfg(AONR, NON_SECURE, NO_OVERRIDE, ENABLE),
Varun Wadekar0012d052016-04-19 14:22:13 -0700192 mc_make_sec_cfg(SESRD, NON_SECURE, NO_OVERRIDE, ENABLE),
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530193 mc_make_sec_cfg(NVENCSRD, NON_SECURE, NO_OVERRIDE, ENABLE),
194 mc_make_sec_cfg(GPUSWR, SECURE, NO_OVERRIDE, DISABLE),
195 mc_make_sec_cfg(TSECSWRB, NON_SECURE, NO_OVERRIDE, ENABLE),
196 mc_make_sec_cfg(ISPWB, NON_SECURE, OVERRIDE, ENABLE),
197 mc_make_sec_cfg(GPUSRD2, SECURE, NO_OVERRIDE, DISABLE),
Varun Wadekar96105732016-03-28 14:28:09 -0700198 mc_make_sec_cfg(APEDMAW, NON_SECURE, NO_OVERRIDE, ENABLE),
199 mc_make_sec_cfg(APER, NON_SECURE, NO_OVERRIDE, ENABLE),
200 mc_make_sec_cfg(APEW, NON_SECURE, NO_OVERRIDE, ENABLE),
201 mc_make_sec_cfg(APEDMAR, NON_SECURE, NO_OVERRIDE, ENABLE),
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530202};
203
Varun Wadekarc9ac3e42016-02-17 15:07:49 -0800204const static mc_txn_override_cfg_t mc_override_cfgs[] = {
205 mc_make_txn_override_cfg(BPMPW, CGID_TAG_ADR),
206 mc_make_txn_override_cfg(EQOSW, CGID_TAG_ADR),
207 mc_make_txn_override_cfg(NVJPGSWR, CGID_TAG_ADR),
208 mc_make_txn_override_cfg(SDMMCWAA, CGID_TAG_ADR),
209 mc_make_txn_override_cfg(MPCOREW, CGID_TAG_ADR),
210 mc_make_txn_override_cfg(SCEDMAW, CGID_TAG_ADR),
211 mc_make_txn_override_cfg(SDMMCW, CGID_TAG_ADR),
212 mc_make_txn_override_cfg(AXISW, CGID_TAG_ADR),
213 mc_make_txn_override_cfg(TSECSWR, CGID_TAG_ADR),
214 mc_make_txn_override_cfg(GPUSWR, CGID_TAG_ADR),
215 mc_make_txn_override_cfg(XUSB_HOSTW, CGID_TAG_ADR),
216 mc_make_txn_override_cfg(TSECSWRB, CGID_TAG_ADR),
217 mc_make_txn_override_cfg(GPUSWR2, CGID_TAG_ADR),
218 mc_make_txn_override_cfg(AONDMAW, CGID_TAG_ADR),
219 mc_make_txn_override_cfg(AONW, CGID_TAG_ADR),
220 mc_make_txn_override_cfg(SESWR, CGID_TAG_ADR),
221 mc_make_txn_override_cfg(BPMPDMAW, CGID_TAG_ADR),
222 mc_make_txn_override_cfg(SDMMCWA, CGID_TAG_ADR),
223 mc_make_txn_override_cfg(HDAW, CGID_TAG_ADR),
224 mc_make_txn_override_cfg(NVDECSWR, CGID_TAG_ADR),
225 mc_make_txn_override_cfg(UFSHCW, CGID_TAG_ADR),
226 mc_make_txn_override_cfg(SATAW, CGID_TAG_ADR),
227 mc_make_txn_override_cfg(ETRW, CGID_TAG_ADR),
228 mc_make_txn_override_cfg(VICSWR, CGID_TAG_ADR),
229 mc_make_txn_override_cfg(NVENCSWR, CGID_TAG_ADR),
230 mc_make_txn_override_cfg(SDMMCWAB, CGID_TAG_ADR),
231 mc_make_txn_override_cfg(ISPWB, CGID_TAG_ADR),
232 mc_make_txn_override_cfg(APEW, CGID_TAG_ADR),
233 mc_make_txn_override_cfg(XUSB_DEVW, CGID_TAG_ADR),
234 mc_make_txn_override_cfg(AFIW, CGID_TAG_ADR),
235 mc_make_txn_override_cfg(SCEW, CGID_TAG_ADR),
236};
237
Varun Wadekara0f26972016-03-11 17:18:51 -0800238static void tegra_memctrl_reconfig_mss_clients(void)
239{
240#if ENABLE_ROC_FOR_ORDERING_CLIENT_REQUESTS
241 uint32_t val, wdata_0, wdata_1;
242
243 /*
244 * Assert Memory Controller's HOTRESET_FLUSH_ENABLE signal for
245 * boot and strongly ordered MSS clients to flush existing memory
246 * traffic and stall future requests.
247 */
248 val = tegra_mc_read_32(MC_CLIENT_HOTRESET_CTRL0);
249 assert(val == MC_CLIENT_HOTRESET_CTRL0_RESET_VAL);
250
251 wdata_0 = MC_CLIENT_HOTRESET_CTRL0_AFI_FLUSH_ENB |
252 MC_CLIENT_HOTRESET_CTRL0_HDA_FLUSH_ENB |
253 MC_CLIENT_HOTRESET_CTRL0_SATA_FLUSH_ENB |
254 MC_CLIENT_HOTRESET_CTRL0_XUSB_HOST_FLUSH_ENB |
255 MC_CLIENT_HOTRESET_CTRL0_XUSB_DEV_FLUSH_ENB;
256 tegra_mc_write_32(MC_CLIENT_HOTRESET_CTRL0, wdata_0);
257
258 /* Wait for HOTRESET STATUS to indicate FLUSH_DONE */
259 do {
260 val = tegra_mc_read_32(MC_CLIENT_HOTRESET_STATUS0);
261 } while ((val & wdata_0) != wdata_0);
262
263 /* Wait one more time due to SW WAR for known legacy issue */
264 do {
265 val = tegra_mc_read_32(MC_CLIENT_HOTRESET_STATUS0);
266 } while ((val & wdata_0) != wdata_0);
267
268 val = tegra_mc_read_32(MC_CLIENT_HOTRESET_CTRL1);
269 assert(val == MC_CLIENT_HOTRESET_CTRL1_RESET_VAL);
270
271 wdata_1 = MC_CLIENT_HOTRESET_CTRL1_SDMMC4A_FLUSH_ENB |
272 MC_CLIENT_HOTRESET_CTRL1_APE_FLUSH_ENB |
273 MC_CLIENT_HOTRESET_CTRL1_SE_FLUSH_ENB |
274 MC_CLIENT_HOTRESET_CTRL1_ETR_FLUSH_ENB |
275 MC_CLIENT_HOTRESET_CTRL1_AXIS_FLUSH_ENB |
276 MC_CLIENT_HOTRESET_CTRL1_EQOS_FLUSH_ENB |
277 MC_CLIENT_HOTRESET_CTRL1_UFSHC_FLUSH_ENB |
278 MC_CLIENT_HOTRESET_CTRL1_BPMP_FLUSH_ENB |
279 MC_CLIENT_HOTRESET_CTRL1_AON_FLUSH_ENB |
280 MC_CLIENT_HOTRESET_CTRL1_SCE_FLUSH_ENB;
281 tegra_mc_write_32(MC_CLIENT_HOTRESET_CTRL1, wdata_1);
282
283 /* Wait for HOTRESET STATUS to indicate FLUSH_DONE */
284 do {
285 val = tegra_mc_read_32(MC_CLIENT_HOTRESET_STATUS1);
286 } while ((val & wdata_1) != wdata_1);
287
288 /* Wait one more time due to SW WAR for known legacy issue */
289 do {
290 val = tegra_mc_read_32(MC_CLIENT_HOTRESET_STATUS1);
291 } while ((val & wdata_1) != wdata_1);
292
293 /*
294 * Change MEMTYPE_OVERRIDE from SO_DEV -> PASSTHRU for boot and
295 * strongly ordered MSS clients. ROC needs to be single point
296 * of control on overriding the memory type. So, remove TSA's
297 * memtype override.
298 */
299 mc_set_tsa_passthrough(AFIW);
300 mc_set_tsa_passthrough(HDAW);
301 mc_set_tsa_passthrough(SATAW);
302 mc_set_tsa_passthrough(XUSB_HOSTW);
303 mc_set_tsa_passthrough(XUSB_DEVW);
304 mc_set_tsa_passthrough(SDMMCWAB);
305 mc_set_tsa_passthrough(APEDMAW);
306 mc_set_tsa_passthrough(SESWR);
307 mc_set_tsa_passthrough(ETRW);
308 mc_set_tsa_passthrough(AXISW);
309 mc_set_tsa_passthrough(EQOSW);
310 mc_set_tsa_passthrough(UFSHCW);
311 mc_set_tsa_passthrough(BPMPDMAW);
312 mc_set_tsa_passthrough(AONDMAW);
313 mc_set_tsa_passthrough(SCEDMAW);
314
315 /*
316 * Change COH_PATH_OVERRIDE_SO_DEV from NO_OVERRIDE -> FORCE_COHERENT
317 * for boot and strongly ordered MSS clients. This steers all sodev
318 * transactions to ROC.
319 *
320 * Change AXID_OVERRIDE/AXID_OVERRIDE_SO_DEV only for some clients
321 * whose AXI IDs we know and trust.
322 */
323
324 /* Match AFIW */
325 mc_set_forced_coherent_so_dev_cfg(AFIR);
326
327 /*
328 * See bug 200131110 comment #35 - there are no normal requests
329 * and AWID for SO/DEV requests is hardcoded in RTL for a
330 * particular PCIE controller
331 */
332 mc_set_forced_coherent_so_dev_cfg(AFIW);
333 mc_set_forced_coherent_cfg(HDAR);
334 mc_set_forced_coherent_cfg(HDAW);
335 mc_set_forced_coherent_cfg(SATAR);
336 mc_set_forced_coherent_cfg(SATAW);
337 mc_set_forced_coherent_cfg(XUSB_HOSTR);
338 mc_set_forced_coherent_cfg(XUSB_HOSTW);
339 mc_set_forced_coherent_cfg(XUSB_DEVR);
340 mc_set_forced_coherent_cfg(XUSB_DEVW);
341 mc_set_forced_coherent_cfg(SDMMCRAB);
342 mc_set_forced_coherent_cfg(SDMMCWAB);
343
344 /* Match APEDMAW */
345 mc_set_forced_coherent_axid_so_dev_cfg(APEDMAR);
346
347 /*
348 * See bug 200131110 comment #35 - AWID for normal requests
349 * is 0x80 and AWID for SO/DEV requests is 0x01
350 */
351 mc_set_forced_coherent_axid_so_dev_cfg(APEDMAW);
352 mc_set_forced_coherent_cfg(SESRD);
353 mc_set_forced_coherent_cfg(SESWR);
354 mc_set_forced_coherent_cfg(ETRR);
355 mc_set_forced_coherent_cfg(ETRW);
356 mc_set_forced_coherent_cfg(AXISR);
357 mc_set_forced_coherent_cfg(AXISW);
358 mc_set_forced_coherent_cfg(EQOSR);
359 mc_set_forced_coherent_cfg(EQOSW);
360 mc_set_forced_coherent_cfg(UFSHCR);
361 mc_set_forced_coherent_cfg(UFSHCW);
362 mc_set_forced_coherent_cfg(BPMPDMAR);
363 mc_set_forced_coherent_cfg(BPMPDMAW);
364 mc_set_forced_coherent_cfg(AONDMAR);
365 mc_set_forced_coherent_cfg(AONDMAW);
366 mc_set_forced_coherent_cfg(SCEDMAR);
367 mc_set_forced_coherent_cfg(SCEDMAW);
368
369 /*
370 * At this point, ordering can occur at ROC. So, remove PCFIFO's
371 * control over ordering requests.
372 *
373 * Change PCFIFO_*_ORDERED_CLIENT from ORDERED -> UNORDERED for
374 * boot and strongly ordered MSS clients
375 */
376 val = MC_PCFIFO_CLIENT_CONFIG1_RESET_VAL &
377 mc_set_pcfifo_unordered_boot_so_mss(1, AFIW) &
378 mc_set_pcfifo_unordered_boot_so_mss(1, HDAW) &
379 mc_set_pcfifo_unordered_boot_so_mss(1, SATAW);
380 tegra_mc_write_32(MC_PCFIFO_CLIENT_CONFIG1, val);
381
382 val = MC_PCFIFO_CLIENT_CONFIG2_RESET_VAL &
383 mc_set_pcfifo_unordered_boot_so_mss(2, XUSB_HOSTW) &
384 mc_set_pcfifo_unordered_boot_so_mss(2, XUSB_DEVW);
385 tegra_mc_write_32(MC_PCFIFO_CLIENT_CONFIG2, val);
386
387 val = MC_PCFIFO_CLIENT_CONFIG3_RESET_VAL &
388 mc_set_pcfifo_unordered_boot_so_mss(3, SDMMCWAB);
389 tegra_mc_write_32(MC_PCFIFO_CLIENT_CONFIG3, val);
390
391 val = MC_PCFIFO_CLIENT_CONFIG4_RESET_VAL &
392 mc_set_pcfifo_unordered_boot_so_mss(4, SESWR) &
393 mc_set_pcfifo_unordered_boot_so_mss(4, ETRW) &
394 mc_set_pcfifo_unordered_boot_so_mss(4, AXISW) &
395 mc_set_pcfifo_unordered_boot_so_mss(4, EQOSW) &
396 mc_set_pcfifo_unordered_boot_so_mss(4, UFSHCW) &
397 mc_set_pcfifo_unordered_boot_so_mss(4, BPMPDMAW) &
398 mc_set_pcfifo_unordered_boot_so_mss(4, AONDMAW) &
399 mc_set_pcfifo_unordered_boot_so_mss(4, SCEDMAW);
400 tegra_mc_write_32(MC_PCFIFO_CLIENT_CONFIG4, val);
401
402 val = MC_PCFIFO_CLIENT_CONFIG5_RESET_VAL &
403 mc_set_pcfifo_unordered_boot_so_mss(5, APEDMAW);
404 tegra_mc_write_32(MC_PCFIFO_CLIENT_CONFIG5, val);
405
406 /*
407 * At this point, ordering can occur at ROC. SMMU need not
408 * reorder any requests.
409 *
410 * Change SMMU_*_ORDERED_CLIENT from ORDERED -> UNORDERED
411 * for boot and strongly ordered MSS clients
412 */
413 val = MC_SMMU_CLIENT_CONFIG1_RESET_VAL &
414 mc_set_smmu_unordered_boot_so_mss(1, AFIW) &
415 mc_set_smmu_unordered_boot_so_mss(1, HDAW) &
416 mc_set_smmu_unordered_boot_so_mss(1, SATAW);
417 tegra_mc_write_32(MC_SMMU_CLIENT_CONFIG1, val);
418
419 val = MC_SMMU_CLIENT_CONFIG2_RESET_VAL &
420 mc_set_smmu_unordered_boot_so_mss(2, XUSB_HOSTW) &
421 mc_set_smmu_unordered_boot_so_mss(2, XUSB_DEVW);
422 tegra_mc_write_32(MC_SMMU_CLIENT_CONFIG2, val);
423
424 val = MC_SMMU_CLIENT_CONFIG3_RESET_VAL &
425 mc_set_smmu_unordered_boot_so_mss(3, SDMMCWAB);
426 tegra_mc_write_32(MC_SMMU_CLIENT_CONFIG3, val);
427
428 val = MC_SMMU_CLIENT_CONFIG4_RESET_VAL &
429 mc_set_smmu_unordered_boot_so_mss(4, SESWR) &
430 mc_set_smmu_unordered_boot_so_mss(4, ETRW) &
431 mc_set_smmu_unordered_boot_so_mss(4, AXISW) &
432 mc_set_smmu_unordered_boot_so_mss(4, EQOSW) &
433 mc_set_smmu_unordered_boot_so_mss(4, UFSHCW) &
434 mc_set_smmu_unordered_boot_so_mss(4, BPMPDMAW) &
435 mc_set_smmu_unordered_boot_so_mss(4, AONDMAW) &
436 mc_set_smmu_unordered_boot_so_mss(4, SCEDMAW);
437 tegra_mc_write_32(MC_SMMU_CLIENT_CONFIG4, val);
438
439 val = MC_SMMU_CLIENT_CONFIG5_RESET_VAL &
440 mc_set_smmu_unordered_boot_so_mss(5, APEDMAW);
441 tegra_mc_write_32(MC_SMMU_CLIENT_CONFIG5, val);
442
443 /*
444 * Deassert HOTRESET FLUSH_ENABLE for boot and strongly ordered MSS
445 * clients to allow memory traffic from all clients to start passing
446 * through ROC
447 */
448 val = tegra_mc_read_32(MC_CLIENT_HOTRESET_CTRL0);
449 assert(val == wdata_0);
450
451 wdata_0 = MC_CLIENT_HOTRESET_CTRL0_RESET_VAL;
452 tegra_mc_write_32(MC_CLIENT_HOTRESET_CTRL0, wdata_0);
453
454 /* Wait for HOTRESET STATUS to indicate FLUSH_DONE */
455 do {
456 val = tegra_mc_read_32(MC_CLIENT_HOTRESET_STATUS0);
457 } while ((val & wdata_0) != wdata_0);
458
459 /* Wait one more time due to SW WAR for known legacy issue */
460 do {
461 val = tegra_mc_read_32(MC_CLIENT_HOTRESET_STATUS0);
462 } while ((val & wdata_0) != wdata_0);
463
464 val = tegra_mc_read_32(MC_CLIENT_HOTRESET_CTRL1);
465 assert(val == wdata_1);
466
467 wdata_1 = MC_CLIENT_HOTRESET_CTRL1_RESET_VAL;
468 tegra_mc_write_32(MC_CLIENT_HOTRESET_CTRL1, wdata_1);
469
470 /* Wait for HOTRESET STATUS to indicate FLUSH_DONE */
471 do {
472 val = tegra_mc_read_32(MC_CLIENT_HOTRESET_STATUS1);
473 } while ((val & wdata_1) != wdata_1);
474
475 /* Wait one more time due to SW WAR for known legacy issue */
476 do {
477 val = tegra_mc_read_32(MC_CLIENT_HOTRESET_STATUS1);
478 } while ((val & wdata_1) != wdata_1);
479
480#endif
481}
482
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530483/*
Varun Wadekar87e44ff2016-03-03 13:22:39 -0800484 * Init Memory controller during boot.
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530485 */
486void tegra_memctrl_setup(void)
487{
488 uint32_t val;
489 uint32_t num_overrides = sizeof(streamid_overrides) / sizeof(uint32_t);
490 uint32_t num_sec_cfgs = sizeof(sec_cfgs) / sizeof(mc_streamid_security_cfg_t);
Varun Wadekarc9ac3e42016-02-17 15:07:49 -0800491 uint32_t num_txn_overrides = sizeof(mc_override_cfgs) / sizeof(mc_txn_override_cfg_t);
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530492 int i;
493
494 INFO("Tegra Memory Controller (v2)\n");
495
496 /* Program the SMMU pagesize */
Varun Wadekar87e44ff2016-03-03 13:22:39 -0800497 tegra_smmu_init();
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530498
499 /* Program all the Stream ID overrides */
500 for (i = 0; i < num_overrides; i++)
501 tegra_mc_streamid_write_32(streamid_overrides[i],
502 MC_STREAM_ID_MAX);
503
504 /* Program the security config settings for all Stream IDs */
505 for (i = 0; i < num_sec_cfgs; i++) {
506 val = sec_cfgs[i].override_enable << 16 |
507 sec_cfgs[i].override_client_inputs << 8 |
508 sec_cfgs[i].override_client_ns_flag << 0;
509 tegra_mc_streamid_write_32(sec_cfgs[i].offset, val);
510 }
511
512 /*
513 * All requests at boot time, and certain requests during
514 * normal run time, are physically addressed and must bypass
515 * the SMMU. The client hub logic implements a hardware bypass
516 * path around the Translation Buffer Units (TBU). During
517 * boot-time, the SMMU_BYPASS_CTRL register (which defaults to
518 * TBU_BYPASS mode) will be used to steer all requests around
519 * the uninitialized TBUs. During normal operation, this register
520 * is locked into TBU_BYPASS_SID config, which routes requests
521 * with special StreamID 0x7f on the bypass path and all others
522 * through the selected TBU. This is done to disable SMMU Bypass
523 * mode, as it could be used to circumvent SMMU security checks.
524 */
525 tegra_mc_write_32(MC_SMMU_BYPASS_CONFIG,
526 MC_SMMU_BYPASS_CONFIG_SETTINGS);
527
Varun Wadekarc9ac3e42016-02-17 15:07:49 -0800528 /*
Varun Wadekara0f26972016-03-11 17:18:51 -0800529 * Re-configure MSS to allow ROC to deal with ordering of the
530 * Memory Controller traffic. This is needed as the Memory Controller
531 * boots with MSS having all control, but ROC provides a performance
532 * boost as compared to MSS.
533 */
534 tegra_memctrl_reconfig_mss_clients();
535
536 /*
Varun Wadekarc9ac3e42016-02-17 15:07:49 -0800537 * Set the MC_TXN_OVERRIDE registers for write clients.
538 */
Varun Wadekare81177d2016-07-18 17:43:41 -0700539 if (!tegra_platform_is_silicon() ||
540 (tegra_platform_is_silicon() && tegra_get_chipid_minor() == 1)) {
Varun Wadekarc9ac3e42016-02-17 15:07:49 -0800541
542 /* GPU and NVENC settings for rev. A01 */
543 val = tegra_mc_read_32(MC_TXN_OVERRIDE_CONFIG_GPUSWR);
544 val &= ~MC_TXN_OVERRIDE_CGID_TAG_MASK;
545 tegra_mc_write_32(MC_TXN_OVERRIDE_CONFIG_GPUSWR,
546 val | MC_TXN_OVERRIDE_CGID_TAG_ZERO);
547
548 val = tegra_mc_read_32(MC_TXN_OVERRIDE_CONFIG_GPUSWR2);
549 val &= ~MC_TXN_OVERRIDE_CGID_TAG_MASK;
550 tegra_mc_write_32(MC_TXN_OVERRIDE_CONFIG_GPUSWR2,
551 val | MC_TXN_OVERRIDE_CGID_TAG_ZERO);
552
553 val = tegra_mc_read_32(MC_TXN_OVERRIDE_CONFIG_NVENCSWR);
554 val &= ~MC_TXN_OVERRIDE_CGID_TAG_MASK;
555 tegra_mc_write_32(MC_TXN_OVERRIDE_CONFIG_NVENCSWR,
556 val | MC_TXN_OVERRIDE_CGID_TAG_CLIENT_AXI_ID);
557
558 } else {
559
560 /* settings for rev. A02 */
561 for (i = 0; i < num_txn_overrides; i++) {
562 val = tegra_mc_read_32(mc_override_cfgs[i].offset);
563 val &= ~MC_TXN_OVERRIDE_CGID_TAG_MASK;
564 tegra_mc_write_32(mc_override_cfgs[i].offset,
565 val | mc_override_cfgs[i].cgid_tag);
566 }
567
568 }
Varun Wadekar87e44ff2016-03-03 13:22:39 -0800569}
Varun Wadekarc9ac3e42016-02-17 15:07:49 -0800570
Varun Wadekar87e44ff2016-03-03 13:22:39 -0800571/*
572 * Restore Memory Controller settings after "System Suspend"
573 */
574void tegra_memctrl_restore_settings(void)
575{
Varun Wadekara0f26972016-03-11 17:18:51 -0800576 /*
577 * Re-configure MSS to allow ROC to deal with ordering of the
578 * Memory Controller traffic. This is needed as the Memory Controller
579 * resets during System Suspend with MSS having all control, but ROC
580 * provides a performance boost as compared to MSS.
581 */
582 tegra_memctrl_reconfig_mss_clients();
583
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530584 /* video memory carveout region */
585 if (video_mem_base) {
586 tegra_mc_write_32(MC_VIDEO_PROTECT_BASE_LO,
587 (uint32_t)video_mem_base);
588 tegra_mc_write_32(MC_VIDEO_PROTECT_BASE_HI,
589 (uint32_t)(video_mem_base >> 32));
Varun Wadekar7058aee2016-04-25 09:01:46 -0700590 tegra_mc_write_32(MC_VIDEO_PROTECT_SIZE_MB, video_mem_size_mb);
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530591
592 /*
593 * MCE propogates the VideoMem configuration values across the
594 * CCPLEX.
595 */
596 mce_update_gsc_videomem();
597 }
598}
599
600/*
601 * Secure the BL31 DRAM aperture.
602 *
603 * phys_base = physical base of TZDRAM aperture
604 * size_in_bytes = size of aperture in bytes
605 */
606void tegra_memctrl_tzdram_setup(uint64_t phys_base, uint32_t size_in_bytes)
607{
608 /*
609 * Setup the Memory controller to allow only secure accesses to
610 * the TZDRAM carveout
611 */
612 INFO("Configuring TrustZone DRAM Memory Carveout\n");
613
614 tegra_mc_write_32(MC_SECURITY_CFG0_0, (uint32_t)phys_base);
615 tegra_mc_write_32(MC_SECURITY_CFG3_0, (uint32_t)(phys_base >> 32));
616 tegra_mc_write_32(MC_SECURITY_CFG1_0, size_in_bytes >> 20);
617
618 /*
Harvey Hsiehc95802d2016-07-29 20:10:59 +0800619 * When TZ encryption enabled,
620 * We need setup TZDRAM before CPU to access TZ Carveout,
621 * otherwise CPU will fetch non-decrypted data.
622 * So save TZDRAM setting for retore by SC7 resume FW.
623 */
624
625 mmio_write_32(TEGRA_SCRATCH_BASE + SECURE_SCRATCH_RSV55_LO,
626 tegra_mc_read_32(MC_SECURITY_CFG0_0));
627 mmio_write_32(TEGRA_SCRATCH_BASE + SECURE_SCRATCH_RSV55_HI,
628 tegra_mc_read_32(MC_SECURITY_CFG3_0));
629 mmio_write_32(TEGRA_SCRATCH_BASE + SECURE_SCRATCH_RSV54_HI,
630 tegra_mc_read_32(MC_SECURITY_CFG1_0));
631
632 /*
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530633 * MCE propogates the security configuration values across the
634 * CCPLEX.
635 */
636 mce_update_gsc_tzdram();
637}
638
639/*
Varun Wadekar13e7dc42015-12-30 15:15:08 -0800640 * Secure the BL31 TZRAM aperture.
641 *
642 * phys_base = physical base of TZRAM aperture
643 * size_in_bytes = size of aperture in bytes
644 */
645void tegra_memctrl_tzram_setup(uint64_t phys_base, uint32_t size_in_bytes)
646{
Varun Wadekare6d43222016-05-25 16:35:04 -0700647 uint32_t index;
648 uint32_t total_128kb_blocks = size_in_bytes >> 17;
649 uint32_t residual_4kb_blocks = (size_in_bytes & 0x1FFFF) >> 12;
Varun Wadekar13e7dc42015-12-30 15:15:08 -0800650 uint32_t val;
651
652 /*
Varun Wadekare6d43222016-05-25 16:35:04 -0700653 * Reset the access configuration registers to restrict access
654 * to the TZRAM aperture
Varun Wadekar13e7dc42015-12-30 15:15:08 -0800655 */
Varun Wadekare6d43222016-05-25 16:35:04 -0700656 for (index = MC_TZRAM_CARVEOUT_CLIENT_ACCESS_CFG0;
657 index <= MC_TZRAM_CARVEOUT_FORCE_INTERNAL_ACCESS5;
658 index += 4)
659 tegra_mc_write_32(index, 0);
Varun Wadekar13e7dc42015-12-30 15:15:08 -0800660
661 /*
Varun Wadekare6d43222016-05-25 16:35:04 -0700662 * Allow CPU read/write access to the aperture
Varun Wadekar13e7dc42015-12-30 15:15:08 -0800663 */
Varun Wadekare6d43222016-05-25 16:35:04 -0700664 tegra_mc_write_32(MC_TZRAM_CARVEOUT_CLIENT_ACCESS_CFG1,
665 TZRAM_CARVEOUT_CPU_WRITE_ACCESS_BIT |
666 TZRAM_CARVEOUT_CPU_READ_ACCESS_BIT);
Varun Wadekar13e7dc42015-12-30 15:15:08 -0800667
Varun Wadekare6d43222016-05-25 16:35:04 -0700668 /*
669 * Set the TZRAM base. TZRAM base must be 4k aligned, at least.
670 */
671 assert(!(phys_base & 0xFFF));
672 tegra_mc_write_32(MC_TZRAM_BASE_LO, (uint32_t)phys_base);
673 tegra_mc_write_32(MC_TZRAM_BASE_HI,
674 (uint32_t)(phys_base >> 32) & TZRAM_BASE_HI_MASK);
Varun Wadekar13e7dc42015-12-30 15:15:08 -0800675
Varun Wadekare6d43222016-05-25 16:35:04 -0700676 /*
677 * Set the TZRAM size
678 *
679 * total size = (number of 128KB blocks) + (number of remaining 4KB
680 * blocks)
681 *
682 */
683 val = (residual_4kb_blocks << TZRAM_SIZE_RANGE_4KB_SHIFT) |
684 total_128kb_blocks;
685 tegra_mc_write_32(MC_TZRAM_SIZE, val);
Varun Wadekar13e7dc42015-12-30 15:15:08 -0800686
Varun Wadekare6d43222016-05-25 16:35:04 -0700687 /*
688 * Lock the configuration settings by disabling TZ-only lock
689 * and locking the configuration against any future changes
690 * at all.
691 */
692 val = tegra_mc_read_32(MC_TZRAM_CARVEOUT_CFG);
693 val &= ~TZRAM_ENABLE_TZ_LOCK_BIT;
694 val |= TZRAM_LOCK_CFG_SETTINGS_BIT;
695 tegra_mc_write_32(MC_TZRAM_CARVEOUT_CFG, val);
Varun Wadekar13e7dc42015-12-30 15:15:08 -0800696
697 /*
698 * MCE propogates the security configuration values across the
699 * CCPLEX.
700 */
701 mce_update_gsc_tzram();
702}
703
704/*
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530705 * Program the Video Memory carveout region
706 *
707 * phys_base = physical base of aperture
708 * size_in_bytes = size of aperture in bytes
709 */
710void tegra_memctrl_videomem_setup(uint64_t phys_base, uint32_t size_in_bytes)
711{
Varun Wadekare60f1bf2016-02-17 10:10:50 -0800712 uint32_t regval;
713
714 /*
715 * The GPU is the user of the Video Memory region. In order to
716 * transition to the new memory region smoothly, we program the
717 * new base/size ONLY if the GPU is in reset mode.
718 */
719 regval = mmio_read_32(TEGRA_CAR_RESET_BASE + TEGRA_GPU_RESET_REG_OFFSET);
720 if ((regval & GPU_RESET_BIT) == 0) {
721 ERROR("GPU not in reset! Video Memory setup failed\n");
722 return;
723 }
724
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530725 /*
726 * Setup the Memory controller to restrict CPU accesses to the Video
727 * Memory region
728 */
729 INFO("Configuring Video Memory Carveout\n");
730
731 tegra_mc_write_32(MC_VIDEO_PROTECT_BASE_LO, (uint32_t)phys_base);
732 tegra_mc_write_32(MC_VIDEO_PROTECT_BASE_HI,
733 (uint32_t)(phys_base >> 32));
Varun Wadekar7058aee2016-04-25 09:01:46 -0700734 tegra_mc_write_32(MC_VIDEO_PROTECT_SIZE_MB, size_in_bytes >> 20);
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530735
736 /* store new values */
737 video_mem_base = phys_base;
Varun Wadekar7058aee2016-04-25 09:01:46 -0700738 video_mem_size_mb = size_in_bytes >> 20;
Varun Wadekarcd5a2f52015-09-20 15:08:22 +0530739
740 /*
741 * MCE propogates the VideoMem configuration values across the
742 * CCPLEX.
743 */
744 mce_update_gsc_videomem();
745}