xref: /rk3399_ARM-atf/lib/cpus/aarch64/cortex_a76.S (revision a6c07e0ddfa3658d7bc0ad1693b6e908293c1c96)
1/*
2 * Copyright (c) 2017-2020, ARM Limited and Contributors. All rights reserved.
3 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7#include <arch.h>
8#include <asm_macros.S>
9#include <common/bl_common.h>
10#include <context.h>
11#include <cortex_a76.h>
12#include <cpu_macros.S>
13#include <plat_macros.S>
14#include <services/arm_arch_svc.h>
15
16/* Hardware handled coherency */
17#if HW_ASSISTED_COHERENCY == 0
18#error "Cortex-A76 must be compiled with HW_ASSISTED_COHERENCY enabled"
19#endif
20
21/* 64-bit only core */
22#if CTX_INCLUDE_AARCH32_REGS == 1
23#error "Cortex-A76 supports only AArch64. Compile with CTX_INCLUDE_AARCH32_REGS=0"
24#endif
25
26#define ESR_EL3_A64_SMC0	0x5e000000
27#define ESR_EL3_A32_SMC0	0x4e000000
28
29#if DYNAMIC_WORKAROUND_CVE_2018_3639
30	/*
31	 * This macro applies the mitigation for CVE-2018-3639.
32	 * It implements a fast path where `SMCCC_ARCH_WORKAROUND_2`
33	 * SMC calls from a lower EL running in AArch32 or AArch64
34	 * will go through the fast and return early.
35	 *
36	 * The macro saves x2-x3 to the context. In the fast path
37	 * x0-x3 registers do not need to be restored as the calling
38	 * context will have saved them.
39	 */
40	.macro apply_cve_2018_3639_wa _is_sync_exception _esr_el3_val
41	stp	x2, x3, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X2]
42
43	.if \_is_sync_exception
44		/*
45		 * Ensure SMC is coming from A64/A32 state on #0
46		 * with W0 = SMCCC_ARCH_WORKAROUND_2
47		 *
48		 * This sequence evaluates as:
49		 *    (W0==SMCCC_ARCH_WORKAROUND_2) ? (ESR_EL3==SMC#0) : (NE)
50		 * allowing use of a single branch operation
51		 */
52		orr	w2, wzr, #SMCCC_ARCH_WORKAROUND_2
53		cmp	x0, x2
54		mrs	x3, esr_el3
55		mov_imm	w2, \_esr_el3_val
56		ccmp	w2, w3, #0, eq
57		/*
58		 * Static predictor will predict a fall-through, optimizing
59		 * the `SMCCC_ARCH_WORKAROUND_2` fast path.
60		 */
61		bne	1f
62
63		/*
64		 * The sequence below implements the `SMCCC_ARCH_WORKAROUND_2`
65		 * fast path.
66		 */
67		cmp	x1, xzr /* enable/disable check */
68
69		/*
70		 * When the calling context wants mitigation disabled,
71		 * we program the mitigation disable function in the
72		 * CPU context, which gets invoked on subsequent exits from
73		 * EL3 via the `el3_exit` function. Otherwise NULL is
74		 * programmed in the CPU context, which results in caller's
75		 * inheriting the EL3 mitigation state (enabled) on subsequent
76		 * `el3_exit`.
77		 */
78		mov	x0, xzr
79		adr	x1, cortex_a76_disable_wa_cve_2018_3639
80		csel	x1, x1, x0, eq
81		str	x1, [sp, #CTX_CVE_2018_3639_OFFSET + CTX_CVE_2018_3639_DISABLE]
82
83		mrs	x2, CORTEX_A76_CPUACTLR2_EL1
84		orr	x1, x2, #CORTEX_A76_CPUACTLR2_EL1_DISABLE_LOAD_PASS_STORE
85		bic	x3, x2, #CORTEX_A76_CPUACTLR2_EL1_DISABLE_LOAD_PASS_STORE
86		csel	x3, x3, x1, eq
87		msr	CORTEX_A76_CPUACTLR2_EL1, x3
88		exception_return /* exception_return contains ISB */
89	.endif
901:
91	/*
92	 * Always enable v4 mitigation during EL3 execution. This is not
93	 * required for the fast path above because it does not perform any
94	 * memory loads.
95	 */
96	mrs	x2, CORTEX_A76_CPUACTLR2_EL1
97	orr	x2, x2, #CORTEX_A76_CPUACTLR2_EL1_DISABLE_LOAD_PASS_STORE
98	msr	CORTEX_A76_CPUACTLR2_EL1, x2
99	isb
100
101	/*
102	 * The caller may have passed arguments to EL3 via x2-x3.
103	 * Restore these registers from the context before jumping to the
104	 * main runtime vector table entry.
105	 */
106	ldp	x2, x3, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X2]
107	.endm
108
109vector_base cortex_a76_wa_cve_2018_3639_a76_vbar
110
111	/* ---------------------------------------------------------------------
112	 * Current EL with SP_EL0 : 0x0 - 0x200
113	 * ---------------------------------------------------------------------
114	 */
115vector_entry cortex_a76_sync_exception_sp_el0
116	b	sync_exception_sp_el0
117end_vector_entry cortex_a76_sync_exception_sp_el0
118
119vector_entry cortex_a76_irq_sp_el0
120	b	irq_sp_el0
121end_vector_entry cortex_a76_irq_sp_el0
122
123vector_entry cortex_a76_fiq_sp_el0
124	b	fiq_sp_el0
125end_vector_entry cortex_a76_fiq_sp_el0
126
127vector_entry cortex_a76_serror_sp_el0
128	b	serror_sp_el0
129end_vector_entry cortex_a76_serror_sp_el0
130
131	/* ---------------------------------------------------------------------
132	 * Current EL with SP_ELx: 0x200 - 0x400
133	 * ---------------------------------------------------------------------
134	 */
135vector_entry cortex_a76_sync_exception_sp_elx
136	b	sync_exception_sp_elx
137end_vector_entry cortex_a76_sync_exception_sp_elx
138
139vector_entry cortex_a76_irq_sp_elx
140	b	irq_sp_elx
141end_vector_entry cortex_a76_irq_sp_elx
142
143vector_entry cortex_a76_fiq_sp_elx
144	b	fiq_sp_elx
145end_vector_entry cortex_a76_fiq_sp_elx
146
147vector_entry cortex_a76_serror_sp_elx
148	b	serror_sp_elx
149end_vector_entry cortex_a76_serror_sp_elx
150
151	/* ---------------------------------------------------------------------
152	 * Lower EL using AArch64 : 0x400 - 0x600
153	 * ---------------------------------------------------------------------
154	 */
155vector_entry cortex_a76_sync_exception_aarch64
156	apply_cve_2018_3639_wa _is_sync_exception=1 _esr_el3_val=ESR_EL3_A64_SMC0
157	b	sync_exception_aarch64
158end_vector_entry cortex_a76_sync_exception_aarch64
159
160vector_entry cortex_a76_irq_aarch64
161	apply_cve_2018_3639_wa _is_sync_exception=0 _esr_el3_val=ESR_EL3_A64_SMC0
162	b	irq_aarch64
163end_vector_entry cortex_a76_irq_aarch64
164
165vector_entry cortex_a76_fiq_aarch64
166	apply_cve_2018_3639_wa _is_sync_exception=0 _esr_el3_val=ESR_EL3_A64_SMC0
167	b	fiq_aarch64
168end_vector_entry cortex_a76_fiq_aarch64
169
170vector_entry cortex_a76_serror_aarch64
171	apply_cve_2018_3639_wa _is_sync_exception=0 _esr_el3_val=ESR_EL3_A64_SMC0
172	b	serror_aarch64
173end_vector_entry cortex_a76_serror_aarch64
174
175	/* ---------------------------------------------------------------------
176	 * Lower EL using AArch32 : 0x600 - 0x800
177	 * ---------------------------------------------------------------------
178	 */
179vector_entry cortex_a76_sync_exception_aarch32
180	apply_cve_2018_3639_wa _is_sync_exception=1 _esr_el3_val=ESR_EL3_A32_SMC0
181	b	sync_exception_aarch32
182end_vector_entry cortex_a76_sync_exception_aarch32
183
184vector_entry cortex_a76_irq_aarch32
185	apply_cve_2018_3639_wa _is_sync_exception=0 _esr_el3_val=ESR_EL3_A32_SMC0
186	b	irq_aarch32
187end_vector_entry cortex_a76_irq_aarch32
188
189vector_entry cortex_a76_fiq_aarch32
190	apply_cve_2018_3639_wa _is_sync_exception=0 _esr_el3_val=ESR_EL3_A32_SMC0
191	b	fiq_aarch32
192end_vector_entry cortex_a76_fiq_aarch32
193
194vector_entry cortex_a76_serror_aarch32
195	apply_cve_2018_3639_wa _is_sync_exception=0 _esr_el3_val=ESR_EL3_A32_SMC0
196	b	serror_aarch32
197end_vector_entry cortex_a76_serror_aarch32
198#endif /* DYNAMIC_WORKAROUND_CVE_2018_3639 */
199
200	/* --------------------------------------------------
201	 * Errata Workaround for Cortex A76 Errata #1073348.
202	 * This applies only to revision <= r1p0 of Cortex A76.
203	 * Inputs:
204	 * x0: variant[4:7] and revision[0:3] of current cpu.
205	 * Shall clobber: x0-x17
206	 * --------------------------------------------------
207	 */
208func errata_a76_1073348_wa
209	/*
210	 * Compare x0 against revision r1p0
211	 */
212	mov	x17, x30
213	bl	check_errata_1073348
214	cbz	x0, 1f
215	mrs	x1, CORTEX_A76_CPUACTLR_EL1
216	orr	x1, x1 ,#CORTEX_A76_CPUACTLR_EL1_DISABLE_STATIC_PREDICTION
217	msr	CORTEX_A76_CPUACTLR_EL1, x1
218	isb
2191:
220	ret	x17
221endfunc errata_a76_1073348_wa
222
223func check_errata_1073348
224	mov	x1, #0x10
225	b	cpu_rev_var_ls
226endfunc check_errata_1073348
227
228	/* --------------------------------------------------
229	 * Errata Workaround for Cortex A76 Errata #1130799.
230	 * This applies only to revision <= r2p0 of Cortex A76.
231	 * Inputs:
232	 * x0: variant[4:7] and revision[0:3] of current cpu.
233	 * Shall clobber: x0-x17
234	 * --------------------------------------------------
235	 */
236func errata_a76_1130799_wa
237	/*
238	 * Compare x0 against revision r2p0
239	 */
240	mov	x17, x30
241	bl	check_errata_1130799
242	cbz	x0, 1f
243	mrs	x1, CORTEX_A76_CPUACTLR2_EL1
244	orr	x1, x1 ,#(1 << 59)
245	msr	CORTEX_A76_CPUACTLR2_EL1, x1
246	isb
2471:
248	ret	x17
249endfunc errata_a76_1130799_wa
250
251func check_errata_1130799
252	mov	x1, #0x20
253	b	cpu_rev_var_ls
254endfunc check_errata_1130799
255
256	/* --------------------------------------------------
257	 * Errata Workaround for Cortex A76 Errata #1220197.
258	 * This applies only to revision <= r2p0 of Cortex A76.
259	 * Inputs:
260	 * x0: variant[4:7] and revision[0:3] of current cpu.
261	 * Shall clobber: x0-x17
262	 * --------------------------------------------------
263	 */
264func errata_a76_1220197_wa
265/*
266 * Compare x0 against revision r2p0
267 */
268	mov	x17, x30
269	bl	check_errata_1220197
270	cbz	x0, 1f
271	mrs	x1, CORTEX_A76_CPUECTLR_EL1
272	orr	x1, x1, #CORTEX_A76_CPUECTLR_EL1_WS_THR_L2
273	msr	CORTEX_A76_CPUECTLR_EL1, x1
274	isb
2751:
276	ret	x17
277endfunc errata_a76_1220197_wa
278
279func check_errata_1220197
280	mov	x1, #0x20
281	b	cpu_rev_var_ls
282endfunc check_errata_1220197
283
284	/* --------------------------------------------------
285	 * Errata Workaround for Cortex A76 Errata #1257314.
286	 * This applies only to revision <= r3p0 of Cortex A76.
287	 * Inputs:
288	 * x0: variant[4:7] and revision[0:3] of current cpu.
289	 * Shall clobber: x0-x17
290	 * --------------------------------------------------
291	 */
292func errata_a76_1257314_wa
293	/*
294	 * Compare x0 against revision r3p0
295	 */
296	mov	x17, x30
297	bl	check_errata_1257314
298	cbz	x0, 1f
299	mrs	x1, CORTEX_A76_CPUACTLR3_EL1
300	orr	x1, x1, CORTEX_A76_CPUACTLR3_EL1_BIT_10
301	msr	CORTEX_A76_CPUACTLR3_EL1, x1
302	isb
3031:
304	ret	x17
305endfunc errata_a76_1257314_wa
306
307func check_errata_1257314
308	mov	x1, #0x30
309	b	cpu_rev_var_ls
310endfunc check_errata_1257314
311
312	/* --------------------------------------------------
313	 * Errata Workaround for Cortex A76 Errata #1262888.
314	 * This applies only to revision <= r3p0 of Cortex A76.
315	 * Inputs:
316	 * x0: variant[4:7] and revision[0:3] of current cpu.
317	 * Shall clobber: x0-x17
318	 * --------------------------------------------------
319	 */
320func errata_a76_1262888_wa
321	/*
322	 * Compare x0 against revision r3p0
323	 */
324	mov	x17, x30
325	bl	check_errata_1262888
326	cbz	x0, 1f
327	mrs	x1, CORTEX_A76_CPUECTLR_EL1
328	orr	x1, x1, CORTEX_A76_CPUECTLR_EL1_BIT_51
329	msr	CORTEX_A76_CPUECTLR_EL1, x1
330	isb
3311:
332	ret	x17
333endfunc errata_a76_1262888_wa
334
335func check_errata_1262888
336	mov	x1, #0x30
337	b	cpu_rev_var_ls
338endfunc check_errata_1262888
339
340	/* --------------------------------------------------
341	 * Errata Workaround for Cortex A76 Errata #1275112
342	 * and Errata #1262606.
343	 * This applies only to revision <= r3p0 of Cortex A76.
344	 * Inputs:
345	 * x0: variant[4:7] and revision[0:3] of current cpu.
346	 * Shall clobber: x0-x17
347	 * --------------------------------------------------
348	 */
349func errata_a76_1275112_1262606_wa
350	/*
351	 * Compare x0 against revision r3p0
352	 */
353	mov	x17, x30
354	/*
355	 * Since both errata #1275112 and #1262606 have the same check, we can
356	 * invoke any one of them for the check here.
357	 */
358	bl	check_errata_1275112
359	cbz	x0, 1f
360	mrs	x1, CORTEX_A76_CPUACTLR_EL1
361	orr	x1, x1, CORTEX_A76_CPUACTLR_EL1_BIT_13
362	msr	CORTEX_A76_CPUACTLR_EL1, x1
363	isb
3641:
365	ret	x17
366endfunc errata_a76_1275112_1262606_wa
367
368func check_errata_1262606
369	mov	x1, #0x30
370	b	cpu_rev_var_ls
371endfunc check_errata_1262606
372
373func check_errata_1275112
374	mov	x1, #0x30
375	b	cpu_rev_var_ls
376endfunc check_errata_1275112
377
378	/* ---------------------------------------------------
379	 * Errata Workaround for Cortex A76 Errata #1286807.
380	 * This applies only to revision <= r3p0 of Cortex A76.
381	 * Due to the nature of the errata it is applied unconditionally
382	 * when built in, report it as applicable in this case
383	 * ---------------------------------------------------
384	 */
385func check_errata_1286807
386#if ERRATA_A76_1286807
387	mov x0, #ERRATA_APPLIES
388	ret
389#else
390	mov	x1, #0x30
391	b	cpu_rev_var_ls
392#endif
393endfunc check_errata_1286807
394
395	/* --------------------------------------------------
396	 * Errata workaround for Cortex A76 Errata #1791580.
397	 * This applies to revisions <= r4p0 of Cortex A76.
398	 * Inputs:
399	 * x0: variant[4:7] and revision[0:3] of current cpu.
400	 * Shall clobber: x0-x17
401	 * --------------------------------------------------
402	 */
403func errata_a76_1791580_wa
404	/* Compare x0 against revision r4p0 */
405	mov	x17, x30
406	bl	check_errata_1791580
407	cbz	x0, 1f
408	mrs	x1, CORTEX_A76_CPUACTLR2_EL1
409	orr	x1, x1, CORTEX_A76_CPUACTLR2_EL1_BIT_2
410	msr	CORTEX_A76_CPUACTLR2_EL1, x1
411	isb
4121:
413	ret	x17
414endfunc errata_a76_1791580_wa
415
416func check_errata_1791580
417	/* Applies to everything <=r4p0. */
418	mov	x1, #0x40
419	b	cpu_rev_var_ls
420endfunc check_errata_1791580
421
422	/* --------------------------------------------------
423	 * Errata Workaround for Cortex A76 Errata #1800710.
424	 * This applies to revision <= r4p0 of Cortex A76.
425	 * Inputs:
426	 * x0: variant[4:7] and revision[0:3] of current cpu.
427	 * Shall clobber: x0-x17
428	 * --------------------------------------------------
429	 */
430func errata_a76_1800710_wa
431	/* Compare x0 against revision <= r4p0 */
432	mov	x17, x30
433	bl	check_errata_1800710
434	cbz	x0, 1f
435
436	/* Disable allocation of splintered pages in the L2 TLB */
437	mrs	x1, CORTEX_A76_CPUECTLR_EL1
438	orr	x1, x1, CORTEX_A76_CPUECTLR_EL1_BIT_53
439	msr	CORTEX_A76_CPUECTLR_EL1, x1
440	isb
4411:
442	ret	x17
443endfunc errata_a76_1800710_wa
444
445func check_errata_1800710
446	/* Applies to everything <= r4p0 */
447	mov	x1, #0x40
448	b	cpu_rev_var_ls
449endfunc check_errata_1800710
450
451func check_errata_cve_2018_3639
452#if WORKAROUND_CVE_2018_3639
453	mov	x0, #ERRATA_APPLIES
454#else
455	mov	x0, #ERRATA_MISSING
456#endif
457	ret
458endfunc check_errata_cve_2018_3639
459
460func cortex_a76_disable_wa_cve_2018_3639
461	mrs	x0, CORTEX_A76_CPUACTLR2_EL1
462	bic	x0, x0, #CORTEX_A76_CPUACTLR2_EL1_DISABLE_LOAD_PASS_STORE
463	msr	CORTEX_A76_CPUACTLR2_EL1, x0
464	isb
465	ret
466endfunc cortex_a76_disable_wa_cve_2018_3639
467
468	/* --------------------------------------------------------------
469	 * Errata Workaround for Cortex A76 Errata #1165522.
470	 * This applies only to revisions <= r3p0 of Cortex A76.
471	 * Due to the nature of the errata it is applied unconditionally
472	 * when built in, report it as applicable in this case
473	 * --------------------------------------------------------------
474	 */
475func check_errata_1165522
476#if ERRATA_A76_1165522
477	mov	x0, #ERRATA_APPLIES
478	ret
479#else
480	mov	x1, #0x30
481	b	cpu_rev_var_ls
482#endif
483endfunc check_errata_1165522
484
485	/* -------------------------------------------------
486	 * The CPU Ops reset function for Cortex-A76.
487	 * Shall clobber: x0-x19
488	 * -------------------------------------------------
489	 */
490func cortex_a76_reset_func
491	mov	x19, x30
492	bl	cpu_get_rev_var
493	mov	x18, x0
494
495#if ERRATA_A76_1073348
496	mov	x0, x18
497	bl	errata_a76_1073348_wa
498#endif
499
500#if ERRATA_A76_1130799
501	mov	x0, x18
502	bl	errata_a76_1130799_wa
503#endif
504
505#if ERRATA_A76_1220197
506	mov	x0, x18
507	bl	errata_a76_1220197_wa
508#endif
509
510#if ERRATA_A76_1257314
511	mov	x0, x18
512	bl	errata_a76_1257314_wa
513#endif
514
515#if ERRATA_A76_1262606 || ERRATA_A76_1275112
516	mov	x0, x18
517	bl	errata_a76_1275112_1262606_wa
518#endif
519
520#if ERRATA_A76_1262888
521	mov	x0, x18
522	bl	errata_a76_1262888_wa
523#endif
524
525#if ERRATA_A76_1791580
526	mov	x0, x18
527	bl	errata_a76_1791580_wa
528#endif
529
530#if ERRATA_A76_1800710
531	mov	x0, x18
532	bl	errata_a76_1800710_wa
533#endif
534
535#if WORKAROUND_CVE_2018_3639
536	/* If the PE implements SSBS, we don't need the dynamic workaround */
537	mrs	x0, id_aa64pfr1_el1
538	lsr	x0, x0, #ID_AA64PFR1_EL1_SSBS_SHIFT
539	and	x0, x0, #ID_AA64PFR1_EL1_SSBS_MASK
540#if !DYNAMIC_WORKAROUND_CVE_2018_3639 && ENABLE_ASSERTIONS
541	cmp	x0, 0
542	ASM_ASSERT(ne)
543#endif
544#if DYNAMIC_WORKAROUND_CVE_2018_3639
545	cbnz	x0, 1f
546	mrs	x0, CORTEX_A76_CPUACTLR2_EL1
547	orr	x0, x0, #CORTEX_A76_CPUACTLR2_EL1_DISABLE_LOAD_PASS_STORE
548	msr	CORTEX_A76_CPUACTLR2_EL1, x0
549	isb
550
551#ifdef IMAGE_BL31
552	/*
553	 * The Cortex-A76 generic vectors are overwritten to use the vectors
554	 * defined above. This is required in order to apply mitigation
555	 * against CVE-2018-3639 on exception entry from lower ELs.
556	 */
557	adr	x0, cortex_a76_wa_cve_2018_3639_a76_vbar
558	msr	vbar_el3, x0
559	isb
560#endif /* IMAGE_BL31 */
561
5621:
563#endif /* DYNAMIC_WORKAROUND_CVE_2018_3639 */
564#endif /* WORKAROUND_CVE_2018_3639 */
565
566#if ERRATA_DSU_798953
567	bl	errata_dsu_798953_wa
568#endif
569
570#if ERRATA_DSU_936184
571	bl	errata_dsu_936184_wa
572#endif
573
574	ret	x19
575endfunc cortex_a76_reset_func
576
577	/* ---------------------------------------------
578	 * HW will do the cache maintenance while powering down
579	 * ---------------------------------------------
580	 */
581func cortex_a76_core_pwr_dwn
582	/* ---------------------------------------------
583	 * Enable CPU power down bit in power control register
584	 * ---------------------------------------------
585	 */
586	mrs	x0, CORTEX_A76_CPUPWRCTLR_EL1
587	orr	x0, x0, #CORTEX_A76_CORE_PWRDN_EN_MASK
588	msr	CORTEX_A76_CPUPWRCTLR_EL1, x0
589	isb
590	ret
591endfunc cortex_a76_core_pwr_dwn
592
593#if REPORT_ERRATA
594/*
595 * Errata printing function for Cortex A76. Must follow AAPCS.
596 */
597func cortex_a76_errata_report
598	stp	x8, x30, [sp, #-16]!
599
600	bl	cpu_get_rev_var
601	mov	x8, x0
602
603	/*
604	 * Report all errata. The revision-variant information is passed to
605	 * checking functions of each errata.
606	 */
607	report_errata ERRATA_A76_1073348, cortex_a76, 1073348
608	report_errata ERRATA_A76_1130799, cortex_a76, 1130799
609	report_errata ERRATA_A76_1220197, cortex_a76, 1220197
610	report_errata ERRATA_A76_1257314, cortex_a76, 1257314
611	report_errata ERRATA_A76_1262606, cortex_a76, 1262606
612	report_errata ERRATA_A76_1262888, cortex_a76, 1262888
613	report_errata ERRATA_A76_1275112, cortex_a76, 1275112
614	report_errata ERRATA_A76_1286807, cortex_a76, 1286807
615	report_errata ERRATA_A76_1791580, cortex_a76, 1791580
616	report_errata ERRATA_A76_1800710, cortex_a76, 1800710
617	report_errata ERRATA_A76_1165522, cortex_a76, 1165522
618	report_errata WORKAROUND_CVE_2018_3639, cortex_a76, cve_2018_3639
619	report_errata ERRATA_DSU_798953, cortex_a76, dsu_798953
620	report_errata ERRATA_DSU_936184, cortex_a76, dsu_936184
621
622	ldp	x8, x30, [sp], #16
623	ret
624endfunc cortex_a76_errata_report
625#endif
626
627	/* ---------------------------------------------
628	 * This function provides cortex_a76 specific
629	 * register information for crash reporting.
630	 * It needs to return with x6 pointing to
631	 * a list of register names in ascii and
632	 * x8 - x15 having values of registers to be
633	 * reported.
634	 * ---------------------------------------------
635	 */
636.section .rodata.cortex_a76_regs, "aS"
637cortex_a76_regs:  /* The ascii list of register names to be reported */
638	.asciz	"cpuectlr_el1", ""
639
640func cortex_a76_cpu_reg_dump
641	adr	x6, cortex_a76_regs
642	mrs	x8, CORTEX_A76_CPUECTLR_EL1
643	ret
644endfunc cortex_a76_cpu_reg_dump
645
646declare_cpu_ops_wa cortex_a76, CORTEX_A76_MIDR, \
647	cortex_a76_reset_func, \
648	CPU_NO_EXTRA1_FUNC, \
649	cortex_a76_disable_wa_cve_2018_3639, \
650	cortex_a76_core_pwr_dwn
651