)]}' { "commit": "f1cbbd6332bb85672dc72cbcc4ac7023323c6936", "tree": "354f4d51157201b5b2832f82ba362a79c35c44ce", "parents": [ "c3bdd3d3cf0f9cdf3be117e39386492e645a1bb5" ], "author": { "name": "Harrison Mutai", "email": "harrison.mutai@arm.com", "time": "Wed May 11 11:05:02 2022 +0100" }, "committer": { "name": "Harrison Mutai", "email": "harrison.mutai@arm.com", "time": "Wed May 18 09:32:08 2022 +0100" }, "message": "fix(bl1): invalidate SP in data cache during secure SMC\n\nInvalidate the SP holding `smc_ctx_t` prior to enabling the data cache\nwhen handling SMCs from the secure world. Enabling the data cache\nwithout doing so results in dirty data either being evicted into main\nmemory, or being used directly from bl1. This corrupted data causes\nsystem failure as the SMC handler attempts to use it.\n\nChange-Id: I5b7225a6fdd1fcfe34ee054ca46dffea06b84b7d\nSigned-off-by: Harrison Mutai \u003charrison.mutai@arm.com\u003e\n", "tree_diff": [ { "type": "modify", "old_id": "493d2ca4e56c3960d09bc2f3c790c22737a4e708", "old_mode": 33188, "old_path": "bl1/aarch32/bl1_exceptions.S", "new_id": "4a6815f1f1e45ca88e64ac1c753efae52efb22e7", "new_mode": 33188, "new_path": "bl1/aarch32/bl1_exceptions.S" } ] }