1/* 2 * Copyright (c) 2017-2020, ARM Limited and Contributors. All rights reserved. 3 * 4 * SPDX-License-Identifier: BSD-3-Clause 5 */ 6 7#include <arch.h> 8#include <asm_macros.S> 9#include <common/bl_common.h> 10#include <context.h> 11#include <cortex_a76.h> 12#include <cpu_macros.S> 13#include <plat_macros.S> 14#include <services/arm_arch_svc.h> 15 16/* Hardware handled coherency */ 17#if HW_ASSISTED_COHERENCY == 0 18#error "Cortex-A76 must be compiled with HW_ASSISTED_COHERENCY enabled" 19#endif 20 21/* 64-bit only core */ 22#if CTX_INCLUDE_AARCH32_REGS == 1 23#error "Cortex-A76 supports only AArch64. Compile with CTX_INCLUDE_AARCH32_REGS=0" 24#endif 25 26#define ESR_EL3_A64_SMC0 0x5e000000 27#define ESR_EL3_A32_SMC0 0x4e000000 28 29#if DYNAMIC_WORKAROUND_CVE_2018_3639 30 /* 31 * This macro applies the mitigation for CVE-2018-3639. 32 * It implements a fast path where `SMCCC_ARCH_WORKAROUND_2` 33 * SMC calls from a lower EL running in AArch32 or AArch64 34 * will go through the fast and return early. 35 * 36 * The macro saves x2-x3 to the context. In the fast path 37 * x0-x3 registers do not need to be restored as the calling 38 * context will have saved them. 39 */ 40 .macro apply_cve_2018_3639_wa _is_sync_exception _esr_el3_val 41 stp x2, x3, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X2] 42 43 .if \_is_sync_exception 44 /* 45 * Ensure SMC is coming from A64/A32 state on #0 46 * with W0 = SMCCC_ARCH_WORKAROUND_2 47 * 48 * This sequence evaluates as: 49 * (W0==SMCCC_ARCH_WORKAROUND_2) ? (ESR_EL3==SMC#0) : (NE) 50 * allowing use of a single branch operation 51 */ 52 orr w2, wzr, #SMCCC_ARCH_WORKAROUND_2 53 cmp x0, x2 54 mrs x3, esr_el3 55 mov_imm w2, \_esr_el3_val 56 ccmp w2, w3, #0, eq 57 /* 58 * Static predictor will predict a fall-through, optimizing 59 * the `SMCCC_ARCH_WORKAROUND_2` fast path. 60 */ 61 bne 1f 62 63 /* 64 * The sequence below implements the `SMCCC_ARCH_WORKAROUND_2` 65 * fast path. 66 */ 67 cmp x1, xzr /* enable/disable check */ 68 69 /* 70 * When the calling context wants mitigation disabled, 71 * we program the mitigation disable function in the 72 * CPU context, which gets invoked on subsequent exits from 73 * EL3 via the `el3_exit` function. Otherwise NULL is 74 * programmed in the CPU context, which results in caller's 75 * inheriting the EL3 mitigation state (enabled) on subsequent 76 * `el3_exit`. 77 */ 78 mov x0, xzr 79 adr x1, cortex_a76_disable_wa_cve_2018_3639 80 csel x1, x1, x0, eq 81 str x1, [sp, #CTX_CVE_2018_3639_OFFSET + CTX_CVE_2018_3639_DISABLE] 82 83 mrs x2, CORTEX_A76_CPUACTLR2_EL1 84 orr x1, x2, #CORTEX_A76_CPUACTLR2_EL1_DISABLE_LOAD_PASS_STORE 85 bic x3, x2, #CORTEX_A76_CPUACTLR2_EL1_DISABLE_LOAD_PASS_STORE 86 csel x3, x3, x1, eq 87 msr CORTEX_A76_CPUACTLR2_EL1, x3 88 exception_return /* exception_return contains ISB */ 89 .endif 901: 91 /* 92 * Always enable v4 mitigation during EL3 execution. This is not 93 * required for the fast path above because it does not perform any 94 * memory loads. 95 */ 96 mrs x2, CORTEX_A76_CPUACTLR2_EL1 97 orr x2, x2, #CORTEX_A76_CPUACTLR2_EL1_DISABLE_LOAD_PASS_STORE 98 msr CORTEX_A76_CPUACTLR2_EL1, x2 99 isb 100 101 /* 102 * The caller may have passed arguments to EL3 via x2-x3. 103 * Restore these registers from the context before jumping to the 104 * main runtime vector table entry. 105 */ 106 ldp x2, x3, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X2] 107 .endm 108 109vector_base cortex_a76_wa_cve_2018_3639_a76_vbar 110 111 /* --------------------------------------------------------------------- 112 * Current EL with SP_EL0 : 0x0 - 0x200 113 * --------------------------------------------------------------------- 114 */ 115vector_entry cortex_a76_sync_exception_sp_el0 116 b sync_exception_sp_el0 117end_vector_entry cortex_a76_sync_exception_sp_el0 118 119vector_entry cortex_a76_irq_sp_el0 120 b irq_sp_el0 121end_vector_entry cortex_a76_irq_sp_el0 122 123vector_entry cortex_a76_fiq_sp_el0 124 b fiq_sp_el0 125end_vector_entry cortex_a76_fiq_sp_el0 126 127vector_entry cortex_a76_serror_sp_el0 128 b serror_sp_el0 129end_vector_entry cortex_a76_serror_sp_el0 130 131 /* --------------------------------------------------------------------- 132 * Current EL with SP_ELx: 0x200 - 0x400 133 * --------------------------------------------------------------------- 134 */ 135vector_entry cortex_a76_sync_exception_sp_elx 136 b sync_exception_sp_elx 137end_vector_entry cortex_a76_sync_exception_sp_elx 138 139vector_entry cortex_a76_irq_sp_elx 140 b irq_sp_elx 141end_vector_entry cortex_a76_irq_sp_elx 142 143vector_entry cortex_a76_fiq_sp_elx 144 b fiq_sp_elx 145end_vector_entry cortex_a76_fiq_sp_elx 146 147vector_entry cortex_a76_serror_sp_elx 148 b serror_sp_elx 149end_vector_entry cortex_a76_serror_sp_elx 150 151 /* --------------------------------------------------------------------- 152 * Lower EL using AArch64 : 0x400 - 0x600 153 * --------------------------------------------------------------------- 154 */ 155vector_entry cortex_a76_sync_exception_aarch64 156 apply_cve_2018_3639_wa _is_sync_exception=1 _esr_el3_val=ESR_EL3_A64_SMC0 157 b sync_exception_aarch64 158end_vector_entry cortex_a76_sync_exception_aarch64 159 160vector_entry cortex_a76_irq_aarch64 161 apply_cve_2018_3639_wa _is_sync_exception=0 _esr_el3_val=ESR_EL3_A64_SMC0 162 b irq_aarch64 163end_vector_entry cortex_a76_irq_aarch64 164 165vector_entry cortex_a76_fiq_aarch64 166 apply_cve_2018_3639_wa _is_sync_exception=0 _esr_el3_val=ESR_EL3_A64_SMC0 167 b fiq_aarch64 168end_vector_entry cortex_a76_fiq_aarch64 169 170vector_entry cortex_a76_serror_aarch64 171 apply_cve_2018_3639_wa _is_sync_exception=0 _esr_el3_val=ESR_EL3_A64_SMC0 172 b serror_aarch64 173end_vector_entry cortex_a76_serror_aarch64 174 175 /* --------------------------------------------------------------------- 176 * Lower EL using AArch32 : 0x600 - 0x800 177 * --------------------------------------------------------------------- 178 */ 179vector_entry cortex_a76_sync_exception_aarch32 180 apply_cve_2018_3639_wa _is_sync_exception=1 _esr_el3_val=ESR_EL3_A32_SMC0 181 b sync_exception_aarch32 182end_vector_entry cortex_a76_sync_exception_aarch32 183 184vector_entry cortex_a76_irq_aarch32 185 apply_cve_2018_3639_wa _is_sync_exception=0 _esr_el3_val=ESR_EL3_A32_SMC0 186 b irq_aarch32 187end_vector_entry cortex_a76_irq_aarch32 188 189vector_entry cortex_a76_fiq_aarch32 190 apply_cve_2018_3639_wa _is_sync_exception=0 _esr_el3_val=ESR_EL3_A32_SMC0 191 b fiq_aarch32 192end_vector_entry cortex_a76_fiq_aarch32 193 194vector_entry cortex_a76_serror_aarch32 195 apply_cve_2018_3639_wa _is_sync_exception=0 _esr_el3_val=ESR_EL3_A32_SMC0 196 b serror_aarch32 197end_vector_entry cortex_a76_serror_aarch32 198#endif /* DYNAMIC_WORKAROUND_CVE_2018_3639 */ 199 200 /* -------------------------------------------------- 201 * Errata Workaround for Cortex A76 Errata #1073348. 202 * This applies only to revision <= r1p0 of Cortex A76. 203 * Inputs: 204 * x0: variant[4:7] and revision[0:3] of current cpu. 205 * Shall clobber: x0-x17 206 * -------------------------------------------------- 207 */ 208func errata_a76_1073348_wa 209 /* 210 * Compare x0 against revision r1p0 211 */ 212 mov x17, x30 213 bl check_errata_1073348 214 cbz x0, 1f 215 mrs x1, CORTEX_A76_CPUACTLR_EL1 216 orr x1, x1 ,#CORTEX_A76_CPUACTLR_EL1_DISABLE_STATIC_PREDICTION 217 msr CORTEX_A76_CPUACTLR_EL1, x1 218 isb 2191: 220 ret x17 221endfunc errata_a76_1073348_wa 222 223func check_errata_1073348 224 mov x1, #0x10 225 b cpu_rev_var_ls 226endfunc check_errata_1073348 227 228 /* -------------------------------------------------- 229 * Errata Workaround for Cortex A76 Errata #1130799. 230 * This applies only to revision <= r2p0 of Cortex A76. 231 * Inputs: 232 * x0: variant[4:7] and revision[0:3] of current cpu. 233 * Shall clobber: x0-x17 234 * -------------------------------------------------- 235 */ 236func errata_a76_1130799_wa 237 /* 238 * Compare x0 against revision r2p0 239 */ 240 mov x17, x30 241 bl check_errata_1130799 242 cbz x0, 1f 243 mrs x1, CORTEX_A76_CPUACTLR2_EL1 244 orr x1, x1 ,#(1 << 59) 245 msr CORTEX_A76_CPUACTLR2_EL1, x1 246 isb 2471: 248 ret x17 249endfunc errata_a76_1130799_wa 250 251func check_errata_1130799 252 mov x1, #0x20 253 b cpu_rev_var_ls 254endfunc check_errata_1130799 255 256 /* -------------------------------------------------- 257 * Errata Workaround for Cortex A76 Errata #1220197. 258 * This applies only to revision <= r2p0 of Cortex A76. 259 * Inputs: 260 * x0: variant[4:7] and revision[0:3] of current cpu. 261 * Shall clobber: x0-x17 262 * -------------------------------------------------- 263 */ 264func errata_a76_1220197_wa 265/* 266 * Compare x0 against revision r2p0 267 */ 268 mov x17, x30 269 bl check_errata_1220197 270 cbz x0, 1f 271 mrs x1, CORTEX_A76_CPUECTLR_EL1 272 orr x1, x1, #CORTEX_A76_CPUECTLR_EL1_WS_THR_L2 273 msr CORTEX_A76_CPUECTLR_EL1, x1 274 isb 2751: 276 ret x17 277endfunc errata_a76_1220197_wa 278 279func check_errata_1220197 280 mov x1, #0x20 281 b cpu_rev_var_ls 282endfunc check_errata_1220197 283 284 /* -------------------------------------------------- 285 * Errata Workaround for Cortex A76 Errata #1257314. 286 * This applies only to revision <= r3p0 of Cortex A76. 287 * Inputs: 288 * x0: variant[4:7] and revision[0:3] of current cpu. 289 * Shall clobber: x0-x17 290 * -------------------------------------------------- 291 */ 292func errata_a76_1257314_wa 293 /* 294 * Compare x0 against revision r3p0 295 */ 296 mov x17, x30 297 bl check_errata_1257314 298 cbz x0, 1f 299 mrs x1, CORTEX_A76_CPUACTLR3_EL1 300 orr x1, x1, CORTEX_A76_CPUACTLR3_EL1_BIT_10 301 msr CORTEX_A76_CPUACTLR3_EL1, x1 302 isb 3031: 304 ret x17 305endfunc errata_a76_1257314_wa 306 307func check_errata_1257314 308 mov x1, #0x30 309 b cpu_rev_var_ls 310endfunc check_errata_1257314 311 312 /* -------------------------------------------------- 313 * Errata Workaround for Cortex A76 Errata #1262888. 314 * This applies only to revision <= r3p0 of Cortex A76. 315 * Inputs: 316 * x0: variant[4:7] and revision[0:3] of current cpu. 317 * Shall clobber: x0-x17 318 * -------------------------------------------------- 319 */ 320func errata_a76_1262888_wa 321 /* 322 * Compare x0 against revision r3p0 323 */ 324 mov x17, x30 325 bl check_errata_1262888 326 cbz x0, 1f 327 mrs x1, CORTEX_A76_CPUECTLR_EL1 328 orr x1, x1, CORTEX_A76_CPUECTLR_EL1_BIT_51 329 msr CORTEX_A76_CPUECTLR_EL1, x1 330 isb 3311: 332 ret x17 333endfunc errata_a76_1262888_wa 334 335func check_errata_1262888 336 mov x1, #0x30 337 b cpu_rev_var_ls 338endfunc check_errata_1262888 339 340 /* --------------------------------------------------- 341 * Errata Workaround for Cortex A76 Errata #1286807. 342 * This applies only to revision <= r3p0 of Cortex A76. 343 * Due to the nature of the errata it is applied unconditionally 344 * when built in, report it as applicable in this case 345 * --------------------------------------------------- 346 */ 347func check_errata_1286807 348#if ERRATA_A76_1286807 349 mov x0, #ERRATA_APPLIES 350 ret 351#else 352 mov x1, #0x30 353 b cpu_rev_var_ls 354#endif 355endfunc check_errata_1286807 356 357 /* -------------------------------------------------- 358 * Errata workaround for Cortex A76 Errata #1791580. 359 * This applies to revisions <= r4p0 of Cortex A76. 360 * Inputs: 361 * x0: variant[4:7] and revision[0:3] of current cpu. 362 * Shall clobber: x0-x17 363 * -------------------------------------------------- 364 */ 365func errata_a76_1791580_wa 366 /* Compare x0 against revision r4p0 */ 367 mov x17, x30 368 bl check_errata_1791580 369 cbz x0, 1f 370 mrs x1, CORTEX_A76_CPUACTLR2_EL1 371 orr x1, x1, CORTEX_A76_CPUACTLR2_EL1_BIT_2 372 msr CORTEX_A76_CPUACTLR2_EL1, x1 373 isb 3741: 375 ret x17 376endfunc errata_a76_1791580_wa 377 378func check_errata_1791580 379 /* Applies to everything <=r4p0. */ 380 mov x1, #0x40 381 b cpu_rev_var_ls 382endfunc check_errata_1791580 383 384 /* -------------------------------------------------- 385 * Errata Workaround for Cortex A76 Errata #1800710. 386 * This applies to revision <= r4p0 of Cortex A76. 387 * Inputs: 388 * x0: variant[4:7] and revision[0:3] of current cpu. 389 * Shall clobber: x0-x17 390 * -------------------------------------------------- 391 */ 392func errata_a76_1800710_wa 393 /* Compare x0 against revision <= r4p0 */ 394 mov x17, x30 395 bl check_errata_1800710 396 cbz x0, 1f 397 398 /* Disable allocation of splintered pages in the L2 TLB */ 399 mrs x1, CORTEX_A76_CPUECTLR_EL1 400 orr x1, x1, CORTEX_A76_CPUECTLR_EL1_BIT_53 401 msr CORTEX_A76_CPUECTLR_EL1, x1 402 isb 4031: 404 ret x17 405endfunc errata_a76_1800710_wa 406 407func check_errata_1800710 408 /* Applies to everything <= r4p0 */ 409 mov x1, #0x40 410 b cpu_rev_var_ls 411endfunc check_errata_1800710 412 413 /* -------------------------------------------------- 414 * Errata Workaround for Cortex A76 Errata #1262606, 415 * #1275112, and #1868343. #1262606 and #1275112 416 * apply to revisions <= r3p0 and #1868343 applies to 417 * revisions <= r4p0. 418 * Inputs: 419 * x0: variant[4:7] and revision[0:3] of current cpu. 420 * Shall clobber: x0-x17 421 * -------------------------------------------------- 422 */ 423 424func errata_a76_1262606_1275112_1868343_wa 425 mov x17, x30 426 427/* Check for <= r3p0 cases and branch if check passes. */ 428#if ERRATA_A76_1262606 || ERRATA_A76_1275112 429 bl check_errata_1262606 430 cbnz x0, 1f 431#endif 432 433/* Check for <= r4p0 cases and branch if check fails. */ 434#if ERRATA_A76_1868343 435 bl check_errata_1868343 436 cbz x0, 2f 437#endif 4381: 439 mrs x1, CORTEX_A76_CPUACTLR_EL1 440 orr x1, x1, #CORTEX_A76_CPUACTLR_EL1_BIT_13 441 msr CORTEX_A76_CPUACTLR_EL1, x1 442 isb 4432: 444 ret x17 445endfunc errata_a76_1262606_1275112_1868343_wa 446 447func check_errata_1262606 448 mov x1, #0x30 449 b cpu_rev_var_ls 450endfunc check_errata_1262606 451 452func check_errata_1275112 453 mov x1, #0x30 454 b cpu_rev_var_ls 455endfunc check_errata_1275112 456 457func check_errata_1868343 458 mov x1, #0x40 459 b cpu_rev_var_ls 460endfunc check_errata_1868343 461 462func check_errata_cve_2018_3639 463#if WORKAROUND_CVE_2018_3639 464 mov x0, #ERRATA_APPLIES 465#else 466 mov x0, #ERRATA_MISSING 467#endif 468 ret 469endfunc check_errata_cve_2018_3639 470 471func cortex_a76_disable_wa_cve_2018_3639 472 mrs x0, CORTEX_A76_CPUACTLR2_EL1 473 bic x0, x0, #CORTEX_A76_CPUACTLR2_EL1_DISABLE_LOAD_PASS_STORE 474 msr CORTEX_A76_CPUACTLR2_EL1, x0 475 isb 476 ret 477endfunc cortex_a76_disable_wa_cve_2018_3639 478 479 /* -------------------------------------------------------------- 480 * Errata Workaround for Cortex A76 Errata #1165522. 481 * This applies only to revisions <= r3p0 of Cortex A76. 482 * Due to the nature of the errata it is applied unconditionally 483 * when built in, report it as applicable in this case 484 * -------------------------------------------------------------- 485 */ 486func check_errata_1165522 487#if ERRATA_A76_1165522 488 mov x0, #ERRATA_APPLIES 489 ret 490#else 491 mov x1, #0x30 492 b cpu_rev_var_ls 493#endif 494endfunc check_errata_1165522 495 496 /* ------------------------------------------------- 497 * The CPU Ops reset function for Cortex-A76. 498 * Shall clobber: x0-x19 499 * ------------------------------------------------- 500 */ 501func cortex_a76_reset_func 502 mov x19, x30 503 bl cpu_get_rev_var 504 mov x18, x0 505 506#if ERRATA_A76_1073348 507 mov x0, x18 508 bl errata_a76_1073348_wa 509#endif 510 511#if ERRATA_A76_1130799 512 mov x0, x18 513 bl errata_a76_1130799_wa 514#endif 515 516#if ERRATA_A76_1220197 517 mov x0, x18 518 bl errata_a76_1220197_wa 519#endif 520 521#if ERRATA_A76_1257314 522 mov x0, x18 523 bl errata_a76_1257314_wa 524#endif 525 526#if ERRATA_A76_1262606 || ERRATA_A76_1275112 || ERRATA_A76_1868343 527 mov x0, x18 528 bl errata_a76_1262606_1275112_1868343_wa 529#endif 530 531#if ERRATA_A76_1262888 532 mov x0, x18 533 bl errata_a76_1262888_wa 534#endif 535 536#if ERRATA_A76_1791580 537 mov x0, x18 538 bl errata_a76_1791580_wa 539#endif 540 541#if ERRATA_A76_1800710 542 mov x0, x18 543 bl errata_a76_1800710_wa 544#endif 545 546#if WORKAROUND_CVE_2018_3639 547 /* If the PE implements SSBS, we don't need the dynamic workaround */ 548 mrs x0, id_aa64pfr1_el1 549 lsr x0, x0, #ID_AA64PFR1_EL1_SSBS_SHIFT 550 and x0, x0, #ID_AA64PFR1_EL1_SSBS_MASK 551#if !DYNAMIC_WORKAROUND_CVE_2018_3639 && ENABLE_ASSERTIONS 552 cmp x0, 0 553 ASM_ASSERT(ne) 554#endif 555#if DYNAMIC_WORKAROUND_CVE_2018_3639 556 cbnz x0, 1f 557 mrs x0, CORTEX_A76_CPUACTLR2_EL1 558 orr x0, x0, #CORTEX_A76_CPUACTLR2_EL1_DISABLE_LOAD_PASS_STORE 559 msr CORTEX_A76_CPUACTLR2_EL1, x0 560 isb 561 562#ifdef IMAGE_BL31 563 /* 564 * The Cortex-A76 generic vectors are overwritten to use the vectors 565 * defined above. This is required in order to apply mitigation 566 * against CVE-2018-3639 on exception entry from lower ELs. 567 */ 568 adr x0, cortex_a76_wa_cve_2018_3639_a76_vbar 569 msr vbar_el3, x0 570 isb 571#endif /* IMAGE_BL31 */ 572 5731: 574#endif /* DYNAMIC_WORKAROUND_CVE_2018_3639 */ 575#endif /* WORKAROUND_CVE_2018_3639 */ 576 577#if ERRATA_DSU_798953 578 bl errata_dsu_798953_wa 579#endif 580 581#if ERRATA_DSU_936184 582 bl errata_dsu_936184_wa 583#endif 584 585 ret x19 586endfunc cortex_a76_reset_func 587 588 /* --------------------------------------------- 589 * HW will do the cache maintenance while powering down 590 * --------------------------------------------- 591 */ 592func cortex_a76_core_pwr_dwn 593 /* --------------------------------------------- 594 * Enable CPU power down bit in power control register 595 * --------------------------------------------- 596 */ 597 mrs x0, CORTEX_A76_CPUPWRCTLR_EL1 598 orr x0, x0, #CORTEX_A76_CORE_PWRDN_EN_MASK 599 msr CORTEX_A76_CPUPWRCTLR_EL1, x0 600 isb 601 ret 602endfunc cortex_a76_core_pwr_dwn 603 604#if REPORT_ERRATA 605/* 606 * Errata printing function for Cortex A76. Must follow AAPCS. 607 */ 608func cortex_a76_errata_report 609 stp x8, x30, [sp, #-16]! 610 611 bl cpu_get_rev_var 612 mov x8, x0 613 614 /* 615 * Report all errata. The revision-variant information is passed to 616 * checking functions of each errata. 617 */ 618 report_errata ERRATA_A76_1073348, cortex_a76, 1073348 619 report_errata ERRATA_A76_1130799, cortex_a76, 1130799 620 report_errata ERRATA_A76_1220197, cortex_a76, 1220197 621 report_errata ERRATA_A76_1257314, cortex_a76, 1257314 622 report_errata ERRATA_A76_1262606, cortex_a76, 1262606 623 report_errata ERRATA_A76_1262888, cortex_a76, 1262888 624 report_errata ERRATA_A76_1275112, cortex_a76, 1275112 625 report_errata ERRATA_A76_1286807, cortex_a76, 1286807 626 report_errata ERRATA_A76_1791580, cortex_a76, 1791580 627 report_errata ERRATA_A76_1800710, cortex_a76, 1800710 628 report_errata ERRATA_A76_1165522, cortex_a76, 1165522 629 report_errata ERRATA_A76_1868343, cortex_a76, 1868343 630 report_errata WORKAROUND_CVE_2018_3639, cortex_a76, cve_2018_3639 631 report_errata ERRATA_DSU_798953, cortex_a76, dsu_798953 632 report_errata ERRATA_DSU_936184, cortex_a76, dsu_936184 633 634 ldp x8, x30, [sp], #16 635 ret 636endfunc cortex_a76_errata_report 637#endif 638 639 /* --------------------------------------------- 640 * This function provides cortex_a76 specific 641 * register information for crash reporting. 642 * It needs to return with x6 pointing to 643 * a list of register names in ascii and 644 * x8 - x15 having values of registers to be 645 * reported. 646 * --------------------------------------------- 647 */ 648.section .rodata.cortex_a76_regs, "aS" 649cortex_a76_regs: /* The ascii list of register names to be reported */ 650 .asciz "cpuectlr_el1", "" 651 652func cortex_a76_cpu_reg_dump 653 adr x6, cortex_a76_regs 654 mrs x8, CORTEX_A76_CPUECTLR_EL1 655 ret 656endfunc cortex_a76_cpu_reg_dump 657 658declare_cpu_ops_wa cortex_a76, CORTEX_A76_MIDR, \ 659 cortex_a76_reset_func, \ 660 CPU_NO_EXTRA1_FUNC, \ 661 cortex_a76_disable_wa_cve_2018_3639, \ 662 cortex_a76_core_pwr_dwn 663