xref: /rk3399_ARM-atf/lib/cpus/aarch64/cortex_a76.S (revision d7b5f40823d449cc79e6440174390997cf11a9d9)
1/*
2 * Copyright (c) 2017-2020, ARM Limited and Contributors. All rights reserved.
3 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7#include <arch.h>
8#include <asm_macros.S>
9#include <common/bl_common.h>
10#include <context.h>
11#include <cortex_a76.h>
12#include <cpu_macros.S>
13#include <plat_macros.S>
14#include <services/arm_arch_svc.h>
15
16/* Hardware handled coherency */
17#if HW_ASSISTED_COHERENCY == 0
18#error "Cortex-A76 must be compiled with HW_ASSISTED_COHERENCY enabled"
19#endif
20
21/* 64-bit only core */
22#if CTX_INCLUDE_AARCH32_REGS == 1
23#error "Cortex-A76 supports only AArch64. Compile with CTX_INCLUDE_AARCH32_REGS=0"
24#endif
25
26#define ESR_EL3_A64_SMC0	0x5e000000
27#define ESR_EL3_A32_SMC0	0x4e000000
28
29#if DYNAMIC_WORKAROUND_CVE_2018_3639
30	/*
31	 * This macro applies the mitigation for CVE-2018-3639.
32	 * It implements a fast path where `SMCCC_ARCH_WORKAROUND_2`
33	 * SMC calls from a lower EL running in AArch32 or AArch64
34	 * will go through the fast and return early.
35	 *
36	 * The macro saves x2-x3 to the context. In the fast path
37	 * x0-x3 registers do not need to be restored as the calling
38	 * context will have saved them.
39	 */
40	.macro apply_cve_2018_3639_wa _is_sync_exception _esr_el3_val
41	stp	x2, x3, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X2]
42
43	.if \_is_sync_exception
44		/*
45		 * Ensure SMC is coming from A64/A32 state on #0
46		 * with W0 = SMCCC_ARCH_WORKAROUND_2
47		 *
48		 * This sequence evaluates as:
49		 *    (W0==SMCCC_ARCH_WORKAROUND_2) ? (ESR_EL3==SMC#0) : (NE)
50		 * allowing use of a single branch operation
51		 */
52		orr	w2, wzr, #SMCCC_ARCH_WORKAROUND_2
53		cmp	x0, x2
54		mrs	x3, esr_el3
55		mov_imm	w2, \_esr_el3_val
56		ccmp	w2, w3, #0, eq
57		/*
58		 * Static predictor will predict a fall-through, optimizing
59		 * the `SMCCC_ARCH_WORKAROUND_2` fast path.
60		 */
61		bne	1f
62
63		/*
64		 * The sequence below implements the `SMCCC_ARCH_WORKAROUND_2`
65		 * fast path.
66		 */
67		cmp	x1, xzr /* enable/disable check */
68
69		/*
70		 * When the calling context wants mitigation disabled,
71		 * we program the mitigation disable function in the
72		 * CPU context, which gets invoked on subsequent exits from
73		 * EL3 via the `el3_exit` function. Otherwise NULL is
74		 * programmed in the CPU context, which results in caller's
75		 * inheriting the EL3 mitigation state (enabled) on subsequent
76		 * `el3_exit`.
77		 */
78		mov	x0, xzr
79		adr	x1, cortex_a76_disable_wa_cve_2018_3639
80		csel	x1, x1, x0, eq
81		str	x1, [sp, #CTX_CVE_2018_3639_OFFSET + CTX_CVE_2018_3639_DISABLE]
82
83		mrs	x2, CORTEX_A76_CPUACTLR2_EL1
84		orr	x1, x2, #CORTEX_A76_CPUACTLR2_EL1_DISABLE_LOAD_PASS_STORE
85		bic	x3, x2, #CORTEX_A76_CPUACTLR2_EL1_DISABLE_LOAD_PASS_STORE
86		csel	x3, x3, x1, eq
87		msr	CORTEX_A76_CPUACTLR2_EL1, x3
88		exception_return /* exception_return contains ISB */
89	.endif
901:
91	/*
92	 * Always enable v4 mitigation during EL3 execution. This is not
93	 * required for the fast path above because it does not perform any
94	 * memory loads.
95	 */
96	mrs	x2, CORTEX_A76_CPUACTLR2_EL1
97	orr	x2, x2, #CORTEX_A76_CPUACTLR2_EL1_DISABLE_LOAD_PASS_STORE
98	msr	CORTEX_A76_CPUACTLR2_EL1, x2
99	isb
100
101	/*
102	 * The caller may have passed arguments to EL3 via x2-x3.
103	 * Restore these registers from the context before jumping to the
104	 * main runtime vector table entry.
105	 */
106	ldp	x2, x3, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X2]
107	.endm
108
109vector_base cortex_a76_wa_cve_2018_3639_a76_vbar
110
111	/* ---------------------------------------------------------------------
112	 * Current EL with SP_EL0 : 0x0 - 0x200
113	 * ---------------------------------------------------------------------
114	 */
115vector_entry cortex_a76_sync_exception_sp_el0
116	b	sync_exception_sp_el0
117end_vector_entry cortex_a76_sync_exception_sp_el0
118
119vector_entry cortex_a76_irq_sp_el0
120	b	irq_sp_el0
121end_vector_entry cortex_a76_irq_sp_el0
122
123vector_entry cortex_a76_fiq_sp_el0
124	b	fiq_sp_el0
125end_vector_entry cortex_a76_fiq_sp_el0
126
127vector_entry cortex_a76_serror_sp_el0
128	b	serror_sp_el0
129end_vector_entry cortex_a76_serror_sp_el0
130
131	/* ---------------------------------------------------------------------
132	 * Current EL with SP_ELx: 0x200 - 0x400
133	 * ---------------------------------------------------------------------
134	 */
135vector_entry cortex_a76_sync_exception_sp_elx
136	b	sync_exception_sp_elx
137end_vector_entry cortex_a76_sync_exception_sp_elx
138
139vector_entry cortex_a76_irq_sp_elx
140	b	irq_sp_elx
141end_vector_entry cortex_a76_irq_sp_elx
142
143vector_entry cortex_a76_fiq_sp_elx
144	b	fiq_sp_elx
145end_vector_entry cortex_a76_fiq_sp_elx
146
147vector_entry cortex_a76_serror_sp_elx
148	b	serror_sp_elx
149end_vector_entry cortex_a76_serror_sp_elx
150
151	/* ---------------------------------------------------------------------
152	 * Lower EL using AArch64 : 0x400 - 0x600
153	 * ---------------------------------------------------------------------
154	 */
155vector_entry cortex_a76_sync_exception_aarch64
156	apply_cve_2018_3639_wa _is_sync_exception=1 _esr_el3_val=ESR_EL3_A64_SMC0
157	b	sync_exception_aarch64
158end_vector_entry cortex_a76_sync_exception_aarch64
159
160vector_entry cortex_a76_irq_aarch64
161	apply_cve_2018_3639_wa _is_sync_exception=0 _esr_el3_val=ESR_EL3_A64_SMC0
162	b	irq_aarch64
163end_vector_entry cortex_a76_irq_aarch64
164
165vector_entry cortex_a76_fiq_aarch64
166	apply_cve_2018_3639_wa _is_sync_exception=0 _esr_el3_val=ESR_EL3_A64_SMC0
167	b	fiq_aarch64
168end_vector_entry cortex_a76_fiq_aarch64
169
170vector_entry cortex_a76_serror_aarch64
171	apply_cve_2018_3639_wa _is_sync_exception=0 _esr_el3_val=ESR_EL3_A64_SMC0
172	b	serror_aarch64
173end_vector_entry cortex_a76_serror_aarch64
174
175	/* ---------------------------------------------------------------------
176	 * Lower EL using AArch32 : 0x600 - 0x800
177	 * ---------------------------------------------------------------------
178	 */
179vector_entry cortex_a76_sync_exception_aarch32
180	apply_cve_2018_3639_wa _is_sync_exception=1 _esr_el3_val=ESR_EL3_A32_SMC0
181	b	sync_exception_aarch32
182end_vector_entry cortex_a76_sync_exception_aarch32
183
184vector_entry cortex_a76_irq_aarch32
185	apply_cve_2018_3639_wa _is_sync_exception=0 _esr_el3_val=ESR_EL3_A32_SMC0
186	b	irq_aarch32
187end_vector_entry cortex_a76_irq_aarch32
188
189vector_entry cortex_a76_fiq_aarch32
190	apply_cve_2018_3639_wa _is_sync_exception=0 _esr_el3_val=ESR_EL3_A32_SMC0
191	b	fiq_aarch32
192end_vector_entry cortex_a76_fiq_aarch32
193
194vector_entry cortex_a76_serror_aarch32
195	apply_cve_2018_3639_wa _is_sync_exception=0 _esr_el3_val=ESR_EL3_A32_SMC0
196	b	serror_aarch32
197end_vector_entry cortex_a76_serror_aarch32
198#endif /* DYNAMIC_WORKAROUND_CVE_2018_3639 */
199
200	/* --------------------------------------------------
201	 * Errata Workaround for Cortex A76 Errata #1073348.
202	 * This applies only to revision <= r1p0 of Cortex A76.
203	 * Inputs:
204	 * x0: variant[4:7] and revision[0:3] of current cpu.
205	 * Shall clobber: x0-x17
206	 * --------------------------------------------------
207	 */
208func errata_a76_1073348_wa
209	/*
210	 * Compare x0 against revision r1p0
211	 */
212	mov	x17, x30
213	bl	check_errata_1073348
214	cbz	x0, 1f
215	mrs	x1, CORTEX_A76_CPUACTLR_EL1
216	orr	x1, x1 ,#CORTEX_A76_CPUACTLR_EL1_DISABLE_STATIC_PREDICTION
217	msr	CORTEX_A76_CPUACTLR_EL1, x1
218	isb
2191:
220	ret	x17
221endfunc errata_a76_1073348_wa
222
223func check_errata_1073348
224	mov	x1, #0x10
225	b	cpu_rev_var_ls
226endfunc check_errata_1073348
227
228	/* --------------------------------------------------
229	 * Errata Workaround for Cortex A76 Errata #1130799.
230	 * This applies only to revision <= r2p0 of Cortex A76.
231	 * Inputs:
232	 * x0: variant[4:7] and revision[0:3] of current cpu.
233	 * Shall clobber: x0-x17
234	 * --------------------------------------------------
235	 */
236func errata_a76_1130799_wa
237	/*
238	 * Compare x0 against revision r2p0
239	 */
240	mov	x17, x30
241	bl	check_errata_1130799
242	cbz	x0, 1f
243	mrs	x1, CORTEX_A76_CPUACTLR2_EL1
244	orr	x1, x1 ,#(1 << 59)
245	msr	CORTEX_A76_CPUACTLR2_EL1, x1
246	isb
2471:
248	ret	x17
249endfunc errata_a76_1130799_wa
250
251func check_errata_1130799
252	mov	x1, #0x20
253	b	cpu_rev_var_ls
254endfunc check_errata_1130799
255
256	/* --------------------------------------------------
257	 * Errata Workaround for Cortex A76 Errata #1220197.
258	 * This applies only to revision <= r2p0 of Cortex A76.
259	 * Inputs:
260	 * x0: variant[4:7] and revision[0:3] of current cpu.
261	 * Shall clobber: x0-x17
262	 * --------------------------------------------------
263	 */
264func errata_a76_1220197_wa
265/*
266 * Compare x0 against revision r2p0
267 */
268	mov	x17, x30
269	bl	check_errata_1220197
270	cbz	x0, 1f
271	mrs	x1, CORTEX_A76_CPUECTLR_EL1
272	orr	x1, x1, #CORTEX_A76_CPUECTLR_EL1_WS_THR_L2
273	msr	CORTEX_A76_CPUECTLR_EL1, x1
274	isb
2751:
276	ret	x17
277endfunc errata_a76_1220197_wa
278
279func check_errata_1220197
280	mov	x1, #0x20
281	b	cpu_rev_var_ls
282endfunc check_errata_1220197
283
284	/* --------------------------------------------------
285	 * Errata Workaround for Cortex A76 Errata #1257314.
286	 * This applies only to revision <= r3p0 of Cortex A76.
287	 * Inputs:
288	 * x0: variant[4:7] and revision[0:3] of current cpu.
289	 * Shall clobber: x0-x17
290	 * --------------------------------------------------
291	 */
292func errata_a76_1257314_wa
293	/*
294	 * Compare x0 against revision r3p0
295	 */
296	mov	x17, x30
297	bl	check_errata_1257314
298	cbz	x0, 1f
299	mrs	x1, CORTEX_A76_CPUACTLR3_EL1
300	orr	x1, x1, CORTEX_A76_CPUACTLR3_EL1_BIT_10
301	msr	CORTEX_A76_CPUACTLR3_EL1, x1
302	isb
3031:
304	ret	x17
305endfunc errata_a76_1257314_wa
306
307func check_errata_1257314
308	mov	x1, #0x30
309	b	cpu_rev_var_ls
310endfunc check_errata_1257314
311
312	/* --------------------------------------------------
313	 * Errata Workaround for Cortex A76 Errata #1262888.
314	 * This applies only to revision <= r3p0 of Cortex A76.
315	 * Inputs:
316	 * x0: variant[4:7] and revision[0:3] of current cpu.
317	 * Shall clobber: x0-x17
318	 * --------------------------------------------------
319	 */
320func errata_a76_1262888_wa
321	/*
322	 * Compare x0 against revision r3p0
323	 */
324	mov	x17, x30
325	bl	check_errata_1262888
326	cbz	x0, 1f
327	mrs	x1, CORTEX_A76_CPUECTLR_EL1
328	orr	x1, x1, CORTEX_A76_CPUECTLR_EL1_BIT_51
329	msr	CORTEX_A76_CPUECTLR_EL1, x1
330	isb
3311:
332	ret	x17
333endfunc errata_a76_1262888_wa
334
335func check_errata_1262888
336	mov	x1, #0x30
337	b	cpu_rev_var_ls
338endfunc check_errata_1262888
339
340	/* ---------------------------------------------------
341	 * Errata Workaround for Cortex A76 Errata #1286807.
342	 * This applies only to revision <= r3p0 of Cortex A76.
343	 * Due to the nature of the errata it is applied unconditionally
344	 * when built in, report it as applicable in this case
345	 * ---------------------------------------------------
346	 */
347func check_errata_1286807
348#if ERRATA_A76_1286807
349	mov x0, #ERRATA_APPLIES
350	ret
351#else
352	mov	x1, #0x30
353	b	cpu_rev_var_ls
354#endif
355endfunc check_errata_1286807
356
357	/* --------------------------------------------------
358	 * Errata workaround for Cortex A76 Errata #1791580.
359	 * This applies to revisions <= r4p0 of Cortex A76.
360	 * Inputs:
361	 * x0: variant[4:7] and revision[0:3] of current cpu.
362	 * Shall clobber: x0-x17
363	 * --------------------------------------------------
364	 */
365func errata_a76_1791580_wa
366	/* Compare x0 against revision r4p0 */
367	mov	x17, x30
368	bl	check_errata_1791580
369	cbz	x0, 1f
370	mrs	x1, CORTEX_A76_CPUACTLR2_EL1
371	orr	x1, x1, CORTEX_A76_CPUACTLR2_EL1_BIT_2
372	msr	CORTEX_A76_CPUACTLR2_EL1, x1
373	isb
3741:
375	ret	x17
376endfunc errata_a76_1791580_wa
377
378func check_errata_1791580
379	/* Applies to everything <=r4p0. */
380	mov	x1, #0x40
381	b	cpu_rev_var_ls
382endfunc check_errata_1791580
383
384	/* --------------------------------------------------
385	 * Errata Workaround for Cortex A76 Errata #1800710.
386	 * This applies to revision <= r4p0 of Cortex A76.
387	 * Inputs:
388	 * x0: variant[4:7] and revision[0:3] of current cpu.
389	 * Shall clobber: x0-x17
390	 * --------------------------------------------------
391	 */
392func errata_a76_1800710_wa
393	/* Compare x0 against revision <= r4p0 */
394	mov	x17, x30
395	bl	check_errata_1800710
396	cbz	x0, 1f
397
398	/* Disable allocation of splintered pages in the L2 TLB */
399	mrs	x1, CORTEX_A76_CPUECTLR_EL1
400	orr	x1, x1, CORTEX_A76_CPUECTLR_EL1_BIT_53
401	msr	CORTEX_A76_CPUECTLR_EL1, x1
402	isb
4031:
404	ret	x17
405endfunc errata_a76_1800710_wa
406
407func check_errata_1800710
408	/* Applies to everything <= r4p0 */
409	mov	x1, #0x40
410	b	cpu_rev_var_ls
411endfunc check_errata_1800710
412
413	/* --------------------------------------------------
414	 * Errata Workaround for Cortex A76 Errata #1262606,
415	 * #1275112, and #1868343.  #1262606 and #1275112
416	 * apply to revisions <= r3p0 and #1868343 applies to
417	 * revisions <= r4p0.
418	 * Inputs:
419	 * x0: variant[4:7] and revision[0:3] of current cpu.
420	 * Shall clobber: x0-x17
421	 * --------------------------------------------------
422	 */
423
424func errata_a76_1262606_1275112_1868343_wa
425	mov	x17, x30
426
427/* Check for <= r3p0 cases and branch if check passes. */
428#if ERRATA_A76_1262606 || ERRATA_A76_1275112
429	bl	check_errata_1262606
430	cbnz	x0, 1f
431#endif
432
433/* Check for <= r4p0 cases and branch if check fails. */
434#if ERRATA_A76_1868343
435	bl	check_errata_1868343
436	cbz	x0, 2f
437#endif
4381:
439	mrs	x1, CORTEX_A76_CPUACTLR_EL1
440	orr	x1, x1, #CORTEX_A76_CPUACTLR_EL1_BIT_13
441	msr	CORTEX_A76_CPUACTLR_EL1, x1
442	isb
4432:
444	ret	x17
445endfunc errata_a76_1262606_1275112_1868343_wa
446
447func check_errata_1262606
448	mov	x1, #0x30
449	b	cpu_rev_var_ls
450endfunc check_errata_1262606
451
452func check_errata_1275112
453	mov	x1, #0x30
454	b	cpu_rev_var_ls
455endfunc check_errata_1275112
456
457func check_errata_1868343
458	mov	x1, #0x40
459	b	cpu_rev_var_ls
460endfunc check_errata_1868343
461
462func check_errata_cve_2018_3639
463#if WORKAROUND_CVE_2018_3639
464	mov	x0, #ERRATA_APPLIES
465#else
466	mov	x0, #ERRATA_MISSING
467#endif
468	ret
469endfunc check_errata_cve_2018_3639
470
471func cortex_a76_disable_wa_cve_2018_3639
472	mrs	x0, CORTEX_A76_CPUACTLR2_EL1
473	bic	x0, x0, #CORTEX_A76_CPUACTLR2_EL1_DISABLE_LOAD_PASS_STORE
474	msr	CORTEX_A76_CPUACTLR2_EL1, x0
475	isb
476	ret
477endfunc cortex_a76_disable_wa_cve_2018_3639
478
479	/* --------------------------------------------------------------
480	 * Errata Workaround for Cortex A76 Errata #1165522.
481	 * This applies only to revisions <= r3p0 of Cortex A76.
482	 * Due to the nature of the errata it is applied unconditionally
483	 * when built in, report it as applicable in this case
484	 * --------------------------------------------------------------
485	 */
486func check_errata_1165522
487#if ERRATA_A76_1165522
488	mov	x0, #ERRATA_APPLIES
489	ret
490#else
491	mov	x1, #0x30
492	b	cpu_rev_var_ls
493#endif
494endfunc check_errata_1165522
495
496	/* -------------------------------------------------
497	 * The CPU Ops reset function for Cortex-A76.
498	 * Shall clobber: x0-x19
499	 * -------------------------------------------------
500	 */
501func cortex_a76_reset_func
502	mov	x19, x30
503	bl	cpu_get_rev_var
504	mov	x18, x0
505
506#if ERRATA_A76_1073348
507	mov	x0, x18
508	bl	errata_a76_1073348_wa
509#endif
510
511#if ERRATA_A76_1130799
512	mov	x0, x18
513	bl	errata_a76_1130799_wa
514#endif
515
516#if ERRATA_A76_1220197
517	mov	x0, x18
518	bl	errata_a76_1220197_wa
519#endif
520
521#if ERRATA_A76_1257314
522	mov	x0, x18
523	bl	errata_a76_1257314_wa
524#endif
525
526#if ERRATA_A76_1262606 || ERRATA_A76_1275112 || ERRATA_A76_1868343
527	mov	x0, x18
528	bl	errata_a76_1262606_1275112_1868343_wa
529#endif
530
531#if ERRATA_A76_1262888
532	mov	x0, x18
533	bl	errata_a76_1262888_wa
534#endif
535
536#if ERRATA_A76_1791580
537	mov	x0, x18
538	bl	errata_a76_1791580_wa
539#endif
540
541#if ERRATA_A76_1800710
542	mov	x0, x18
543	bl	errata_a76_1800710_wa
544#endif
545
546#if WORKAROUND_CVE_2018_3639
547	/* If the PE implements SSBS, we don't need the dynamic workaround */
548	mrs	x0, id_aa64pfr1_el1
549	lsr	x0, x0, #ID_AA64PFR1_EL1_SSBS_SHIFT
550	and	x0, x0, #ID_AA64PFR1_EL1_SSBS_MASK
551#if !DYNAMIC_WORKAROUND_CVE_2018_3639 && ENABLE_ASSERTIONS
552	cmp	x0, 0
553	ASM_ASSERT(ne)
554#endif
555#if DYNAMIC_WORKAROUND_CVE_2018_3639
556	cbnz	x0, 1f
557	mrs	x0, CORTEX_A76_CPUACTLR2_EL1
558	orr	x0, x0, #CORTEX_A76_CPUACTLR2_EL1_DISABLE_LOAD_PASS_STORE
559	msr	CORTEX_A76_CPUACTLR2_EL1, x0
560	isb
561
562#ifdef IMAGE_BL31
563	/*
564	 * The Cortex-A76 generic vectors are overwritten to use the vectors
565	 * defined above. This is required in order to apply mitigation
566	 * against CVE-2018-3639 on exception entry from lower ELs.
567	 */
568	adr	x0, cortex_a76_wa_cve_2018_3639_a76_vbar
569	msr	vbar_el3, x0
570	isb
571#endif /* IMAGE_BL31 */
572
5731:
574#endif /* DYNAMIC_WORKAROUND_CVE_2018_3639 */
575#endif /* WORKAROUND_CVE_2018_3639 */
576
577#if ERRATA_DSU_798953
578	bl	errata_dsu_798953_wa
579#endif
580
581#if ERRATA_DSU_936184
582	bl	errata_dsu_936184_wa
583#endif
584
585	ret	x19
586endfunc cortex_a76_reset_func
587
588	/* ---------------------------------------------
589	 * HW will do the cache maintenance while powering down
590	 * ---------------------------------------------
591	 */
592func cortex_a76_core_pwr_dwn
593	/* ---------------------------------------------
594	 * Enable CPU power down bit in power control register
595	 * ---------------------------------------------
596	 */
597	mrs	x0, CORTEX_A76_CPUPWRCTLR_EL1
598	orr	x0, x0, #CORTEX_A76_CORE_PWRDN_EN_MASK
599	msr	CORTEX_A76_CPUPWRCTLR_EL1, x0
600	isb
601	ret
602endfunc cortex_a76_core_pwr_dwn
603
604#if REPORT_ERRATA
605/*
606 * Errata printing function for Cortex A76. Must follow AAPCS.
607 */
608func cortex_a76_errata_report
609	stp	x8, x30, [sp, #-16]!
610
611	bl	cpu_get_rev_var
612	mov	x8, x0
613
614	/*
615	 * Report all errata. The revision-variant information is passed to
616	 * checking functions of each errata.
617	 */
618	report_errata ERRATA_A76_1073348, cortex_a76, 1073348
619	report_errata ERRATA_A76_1130799, cortex_a76, 1130799
620	report_errata ERRATA_A76_1220197, cortex_a76, 1220197
621	report_errata ERRATA_A76_1257314, cortex_a76, 1257314
622	report_errata ERRATA_A76_1262606, cortex_a76, 1262606
623	report_errata ERRATA_A76_1262888, cortex_a76, 1262888
624	report_errata ERRATA_A76_1275112, cortex_a76, 1275112
625	report_errata ERRATA_A76_1286807, cortex_a76, 1286807
626	report_errata ERRATA_A76_1791580, cortex_a76, 1791580
627	report_errata ERRATA_A76_1800710, cortex_a76, 1800710
628	report_errata ERRATA_A76_1165522, cortex_a76, 1165522
629	report_errata ERRATA_A76_1868343, cortex_a76, 1868343
630	report_errata WORKAROUND_CVE_2018_3639, cortex_a76, cve_2018_3639
631	report_errata ERRATA_DSU_798953, cortex_a76, dsu_798953
632	report_errata ERRATA_DSU_936184, cortex_a76, dsu_936184
633
634	ldp	x8, x30, [sp], #16
635	ret
636endfunc cortex_a76_errata_report
637#endif
638
639	/* ---------------------------------------------
640	 * This function provides cortex_a76 specific
641	 * register information for crash reporting.
642	 * It needs to return with x6 pointing to
643	 * a list of register names in ascii and
644	 * x8 - x15 having values of registers to be
645	 * reported.
646	 * ---------------------------------------------
647	 */
648.section .rodata.cortex_a76_regs, "aS"
649cortex_a76_regs:  /* The ascii list of register names to be reported */
650	.asciz	"cpuectlr_el1", ""
651
652func cortex_a76_cpu_reg_dump
653	adr	x6, cortex_a76_regs
654	mrs	x8, CORTEX_A76_CPUECTLR_EL1
655	ret
656endfunc cortex_a76_cpu_reg_dump
657
658declare_cpu_ops_wa cortex_a76, CORTEX_A76_MIDR, \
659	cortex_a76_reset_func, \
660	CPU_NO_EXTRA1_FUNC, \
661	cortex_a76_disable_wa_cve_2018_3639, \
662	cortex_a76_core_pwr_dwn
663