From patchwork Sat Jan 10 16:52:37 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jon Mason X-Patchwork-Id: 78428 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 40BF3D277F3 for ; Sat, 10 Jan 2026 16:52:45 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.12003.1768063963739785841 for ; Sat, 10 Jan 2026 08:52:44 -0800 Authentication-Results: mx.groups.io; dkim=none (message not signed); spf=pass (domain: arm.com, ip: 217.140.110.172, mailfrom: jon.mason@arm.com) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 6CBCE1516 for ; Sat, 10 Jan 2026 08:52:36 -0800 (PST) Received: from H24V3P4C17.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 0E0FE3F6A8 for ; Sat, 10 Jan 2026 08:52:43 -0800 (PST) From: Jon Mason To: meta-arm@lists.yoctoproject.org Subject: [PATCH 1/5] arm/trusted-firmware-m: drop unreferenced patch Date: Sat, 10 Jan 2026 11:52:37 -0500 Message-ID: <20260110165242.38662-1-jon.mason@arm.com> X-Mailer: git-send-email 2.50.1 MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 10 Jan 2026 16:52:45 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/meta-arm/message/6830 Forgot to remove this patch in the previous commit. Removing now. Signed-off-by: Jon Mason --- ...L2-and-TF-M-binary-address-alignment.patch | 134 ------------------ 1 file changed, 134 deletions(-) delete mode 100644 meta-arm/recipes-bsp/trusted-firmware-m/files/0001-Add-checks-for-BL2-and-TF-M-binary-address-alignment.patch diff --git a/meta-arm/recipes-bsp/trusted-firmware-m/files/0001-Add-checks-for-BL2-and-TF-M-binary-address-alignment.patch b/meta-arm/recipes-bsp/trusted-firmware-m/files/0001-Add-checks-for-BL2-and-TF-M-binary-address-alignment.patch deleted file mode 100644 index 4bed335388db..000000000000 --- a/meta-arm/recipes-bsp/trusted-firmware-m/files/0001-Add-checks-for-BL2-and-TF-M-binary-address-alignment.patch +++ /dev/null @@ -1,134 +0,0 @@ -From 57a1a4cbbc40342c88a6fe2f4eaeadbd15dcbfa6 Mon Sep 17 00:00:00 2001 -From: Harsimran Singh Tungal -Date: Fri, 22 Aug 2025 20:34:10 +0000 -Subject: [PATCH 2/2] Add checks for BL2 and TF-M binary address alignment - -Add relevant checks in GCC linker scripts to validate if the -BL2 and TF-M binary addresses are aligned to 0x100 byte boundary -for Cortex-M0+ based platforms. - -Upstream-Status: Backport [069a9b5a3acece140369ff07281b26e25bc50026] -Signed-off-by: Harsimran Singh Tungal ---- - platform/ext/common/gcc/tfm_common_bl2.ld | 12 +++++++++++- - platform/ext/common/gcc/tfm_common_s.ld.template | 13 ++++++++++++- - platform/ext/common/gcc/tfm_isolation_s.ld.template | 13 ++++++++++++- - platform/ext/common/tfm_s_linker_alignments.h | 9 ++++++++- - 4 files changed, 43 insertions(+), 4 deletions(-) - -diff --git a/platform/ext/common/gcc/tfm_common_bl2.ld b/platform/ext/common/gcc/tfm_common_bl2.ld -index eee915210..65d75980b 100644 ---- a/platform/ext/common/gcc/tfm_common_bl2.ld -+++ b/platform/ext/common/gcc/tfm_common_bl2.ld -@@ -1,5 +1,7 @@ - ;/* --; * Copyright (c) 2022-2024 Arm Limited. All rights reserved. -+; * SPDX-FileCopyrightText: Copyright The TrustedFirmware-M Contributors -+; * -+; * SPDX-License-Identifier: BSD-3-Clause - ; * - ; * Licensed under the Apache License, Version 2.0 (the "License"); - ; * you may not use this file except in compliance with the License. -@@ -33,6 +35,14 @@ MEMORY - RAM (rwx) : ORIGIN = BL2_DATA_START, LENGTH = BL2_DATA_SIZE - } - -+/* For Cortex-M0+ VTOR: 256-byte vector table is at the offset 0x00 of the image. -+ * To keep that table in one block, the image base must be a multiple of 0x100. -+ * For reference: https://developer.arm.com/documentation/ddi0419/latest/ -+ */ -+#if defined(__ARM_ARCH_6M__) -+CHECK_ALIGNMENT_256(BL2_CODE_START) -+#endif -+ - __heap_size__ = BL2_HEAP_SIZE; - __msp_stack_size__ = BL2_MSP_STACK_SIZE; - -diff --git a/platform/ext/common/gcc/tfm_common_s.ld.template b/platform/ext/common/gcc/tfm_common_s.ld.template -index 023f2224e..db6a2d570 100644 ---- a/platform/ext/common/gcc/tfm_common_s.ld.template -+++ b/platform/ext/common/gcc/tfm_common_s.ld.template -@@ -1,5 +1,8 @@ - ;/* --; * Copyright (c) 2009-2024 Arm Limited -+; * SPDX-FileCopyrightText: Copyright The TrustedFirmware-M Contributors -+; * -+; * SPDX-License-Identifier: BSD-3-Clause -+; * - ; * Copyright (c) 2022-2024 Cypress Semiconductor Corporation (an Infineon company) - ; * or an affiliate of Cypress Semiconductor Corporation. All rights reserved. - ; * -@@ -38,6 +41,14 @@ MEMORY - #endif - } - -+/* For Cortex-M0+ VTOR: 256-byte vector table is at the offset 0x00 of the image. -+ * To keep that table in one block, the image base must be a multiple of 0x100. -+ * For reference: https://developer.arm.com/documentation/ddi0419/latest/ -+ */ -+#if defined(__ARM_ARCH_6M__) -+CHECK_ALIGNMENT_256(S_CODE_START) -+#endif -+ - #ifndef TFM_LINKER_VENEERS_START - #define TFM_LINKER_VENEERS_START ALIGN(TFM_LINKER_VENEERS_ALIGNMENT) - #endif -diff --git a/platform/ext/common/gcc/tfm_isolation_s.ld.template b/platform/ext/common/gcc/tfm_isolation_s.ld.template -index 00693a19d..6c4f13efa 100644 ---- a/platform/ext/common/gcc/tfm_isolation_s.ld.template -+++ b/platform/ext/common/gcc/tfm_isolation_s.ld.template -@@ -1,5 +1,8 @@ - ;/* --; * Copyright (c) 2009-2024 Arm Limited -+; * SPDX-FileCopyrightText: Copyright The TrustedFirmware-M Contributors -+; * -+; * SPDX-License-Identifier: BSD-3-Clause -+; * - ; * Copyright (c) 2022-2024 Cypress Semiconductor Corporation (an Infineon company) - ; * or an affiliate of Cypress Semiconductor Corporation. All rights reserved. - ; * -@@ -47,6 +50,14 @@ MEMORY - #endif - } - -+/* For Cortex-M0+ VTOR: 256-byte vector table is at the offset 0x00 of the image. -+ * To keep that table in one block, the image base must be a multiple of 0x100. -+ * For reference: https://developer.arm.com/documentation/ddi0419/latest/ -+ */ -+#if defined(__ARM_ARCH_6M__) -+CHECK_ALIGNMENT_256(S_CODE_START) -+#endif -+ - #ifndef TFM_LINKER_VENEERS_START - #define TFM_LINKER_VENEERS_START ALIGN(TFM_LINKER_VENEERS_ALIGNMENT) - #endif -diff --git a/platform/ext/common/tfm_s_linker_alignments.h b/platform/ext/common/tfm_s_linker_alignments.h -index 0d115575c..fb96938c9 100644 ---- a/platform/ext/common/tfm_s_linker_alignments.h -+++ b/platform/ext/common/tfm_s_linker_alignments.h -@@ -1,7 +1,8 @@ - /* - * Copyright (c) 2022 Cypress Semiconductor Corporation (an Infineon company) - * or an affiliate of Cypress Semiconductor Corporation. All rights reserved. -- * Copyright (c) 2024, Arm Limited. All rights reserved. -+ * -+ * SPDX-FileCopyrightText: Copyright The TrustedFirmware-M Contributors - * - * SPDX-License-Identifier: BSD-3-Clause - * -@@ -21,6 +22,12 @@ - - #define CHECK_ALIGNMENT_4(size) ASSERT((size) % 4 == 0, #size) - -+/* For Cortex-M0+ VTOR: 256-byte vector table is at the offset 0x00 of the image. -+ * To keep that table in one block, the image base must be a multiple of 0x100. -+ * For reference: https://developer.arm.com/documentation/ddi0419/latest/ -+ */ -+#define CHECK_ALIGNMENT_256(addr) ASSERT((addr % 256) == 0, #addr) -+ - /* Default alignment for linker file sections is set to 32 because ARM TrustZone - * protection units (SAU and MPU) require regions to be 32 bytes aligned. */ - #ifndef TFM_LINKER_DEFAULT_ALIGNMENT --- -2.43.0 - From patchwork Sat Jan 10 16:52:38 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jon Mason X-Patchwork-Id: 78425 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 47F05D277F6 for ; Sat, 10 Jan 2026 16:52:45 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.12004.1768063963938445596 for ; Sat, 10 Jan 2026 08:52:44 -0800 Authentication-Results: mx.groups.io; dkim=none (message not signed); spf=pass (domain: arm.com, ip: 217.140.110.172, mailfrom: jon.mason@arm.com) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id AF6451684 for ; Sat, 10 Jan 2026 08:52:36 -0800 (PST) Received: from H24V3P4C17.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 568FD3F6A8 for ; Sat, 10 Jan 2026 08:52:43 -0800 (PST) From: Jon Mason To: meta-arm@lists.yoctoproject.org Subject: [PATCH 2/5] arm/hafnium: update to 2.14.0 Date: Sat, 10 Jan 2026 11:52:38 -0500 Message-ID: <20260110165242.38662-2-jon.mason@arm.com> X-Mailer: git-send-email 2.50.1 In-Reply-To: <20260110165242.38662-1-jon.mason@arm.com> References: <20260110165242.38662-1-jon.mason@arm.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 10 Jan 2026 16:52:45 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/meta-arm/message/6831 Signed-off-by: Jon Mason --- .../hafnium/{hafnium_2.13.0.bb => hafnium_2.14.0.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta-arm/recipes-bsp/hafnium/{hafnium_2.13.0.bb => hafnium_2.14.0.bb} (97%) diff --git a/meta-arm/recipes-bsp/hafnium/hafnium_2.13.0.bb b/meta-arm/recipes-bsp/hafnium/hafnium_2.14.0.bb similarity index 97% rename from meta-arm/recipes-bsp/hafnium/hafnium_2.13.0.bb rename to meta-arm/recipes-bsp/hafnium/hafnium_2.14.0.bb index d62ea363db23..f8a374b7f05f 100644 --- a/meta-arm/recipes-bsp/hafnium/hafnium_2.13.0.bb +++ b/meta-arm/recipes-bsp/hafnium/hafnium_2.14.0.bb @@ -13,7 +13,7 @@ SRC_URI = "gitsm://git.trustedfirmware.org/hafnium/hafnium.git;protocol=https;br file://0001-arm-hafnium-fix-kernel-tool-linking.patch \ file://0001-work-around-visibility-issue.patch;patchdir=third_party/dtc \ " -SRCREV = "92be99ed35cd4eaede402fbb2cea9515fbd2bba5" +SRCREV = "ce12c6e53838f1cf07d50b616b72db57a81539a4" B = "${WORKDIR}/build" COMPATIBLE_MACHINE ?= "invalid" From patchwork Sat Jan 10 16:52:39 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jon Mason X-Patchwork-Id: 78424 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 54B17D277F7 for ; Sat, 10 Jan 2026 16:52:45 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.11913.1768063964343152687 for ; Sat, 10 Jan 2026 08:52:44 -0800 Authentication-Results: mx.groups.io; dkim=none (message not signed); spf=pass (domain: arm.com, ip: 217.140.110.172, mailfrom: jon.mason@arm.com) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 059D71691 for ; Sat, 10 Jan 2026 08:52:37 -0800 (PST) Received: from H24V3P4C17.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 9DD3D3F6A8 for ; Sat, 10 Jan 2026 08:52:43 -0800 (PST) From: Jon Mason To: meta-arm@lists.yoctoproject.org Subject: [PATCH 3/5] arm/opencsd: update to 1.7.1 Date: Sat, 10 Jan 2026 11:52:39 -0500 Message-ID: <20260110165242.38662-3-jon.mason@arm.com> X-Mailer: git-send-email 2.50.1 In-Reply-To: <20260110165242.38662-1-jon.mason@arm.com> References: <20260110165242.38662-1-jon.mason@arm.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 10 Jan 2026 16:52:45 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/meta-arm/message/6832 Signed-off-by: Jon Mason --- .../opencsd/{opencsd_1.6.1.bb => opencsd_1.7.1.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta-arm/recipes-devtools/opencsd/{opencsd_1.6.1.bb => opencsd_1.7.1.bb} (95%) diff --git a/meta-arm/recipes-devtools/opencsd/opencsd_1.6.1.bb b/meta-arm/recipes-devtools/opencsd/opencsd_1.7.1.bb similarity index 95% rename from meta-arm/recipes-devtools/opencsd/opencsd_1.6.1.bb rename to meta-arm/recipes-devtools/opencsd/opencsd_1.7.1.bb index fb132d73dd8c..f8429dbbadc9 100644 --- a/meta-arm/recipes-devtools/opencsd/opencsd_1.6.1.bb +++ b/meta-arm/recipes-devtools/opencsd/opencsd_1.7.1.bb @@ -4,7 +4,7 @@ LICENSE = "BSD-3-Clause" LIC_FILES_CHKSUM = "file://LICENSE;md5=ad8cb685eb324d2fa2530b985a43f3e5" SRC_URI = "git://github.com/Linaro/OpenCSD;protocol=https;branch=master" -SRCREV = "78141e2f0ef8fb67284cc1a159cb62737666c965" +SRCREV = "83e4575459305c054ce43f7d5eb5e468e304645c" COMPATIBLE_HOST = "(i.86|x86_64|arm|aarch64).*-linux" From patchwork Sat Jan 10 16:52:40 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jon Mason X-Patchwork-Id: 78426 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 54C0DD277FA for ; Sat, 10 Jan 2026 16:52:45 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.11914.1768063964807372382 for ; Sat, 10 Jan 2026 08:52:44 -0800 Authentication-Results: mx.groups.io; dkim=none (message not signed); spf=pass (domain: arm.com, ip: 217.140.110.172, mailfrom: jon.mason@arm.com) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 49EC21692 for ; Sat, 10 Jan 2026 08:52:37 -0800 (PST) Received: from H24V3P4C17.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id E54FB3F6A8 for ; Sat, 10 Jan 2026 08:52:43 -0800 (PST) From: Jon Mason To: meta-arm@lists.yoctoproject.org Subject: [PATCH 4/5] arm/machine-summary: remove gn Date: Sat, 10 Jan 2026 11:52:40 -0500 Message-ID: <20260110165242.38662-4-jon.mason@arm.com> X-Mailer: git-send-email 2.50.1 In-Reply-To: <20260110165242.38662-1-jon.mason@arm.com> References: <20260110165242.38662-1-jon.mason@arm.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 10 Jan 2026 16:52:45 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/meta-arm/message/6833 gn was moved to oe-core. So, we no longer need to track it as part of the meta-arm CI machine-report Signed-off-by: Jon Mason --- scripts/machine-summary.py | 1 - 1 file changed, 1 deletion(-) diff --git a/scripts/machine-summary.py b/scripts/machine-summary.py index 325d8a65c469..c9c9242af9dc 100755 --- a/scripts/machine-summary.py +++ b/scripts/machine-summary.py @@ -141,7 +141,6 @@ def harvest_data(machines, recipes): recipes = ("boot-wrapper-aarch64", "edk2-firmware", "gator-daemon", - "gn", "hafnium", "opencsd", "optee-ftpm", From patchwork Sat Jan 10 16:52:41 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jon Mason X-Patchwork-Id: 78427 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 41D51D277C1 for ; Sat, 10 Jan 2026 16:52:45 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.12005.1768063964806328604 for ; Sat, 10 Jan 2026 08:52:44 -0800 Authentication-Results: mx.groups.io; dkim=none (message not signed); spf=pass (domain: arm.com, ip: 217.140.110.172, mailfrom: jon.mason@arm.com) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 913601516 for ; Sat, 10 Jan 2026 08:52:37 -0800 (PST) Received: from H24V3P4C17.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 3855E3F6A8 for ; Sat, 10 Jan 2026 08:52:44 -0800 (PST) From: Jon Mason To: meta-arm@lists.yoctoproject.org Subject: [PATCH 5/5] arm/boot-wrapper-aarch64: update to latest commit Date: Sat, 10 Jan 2026 11:52:41 -0500 Message-ID: <20260110165242.38662-5-jon.mason@arm.com> X-Mailer: git-send-email 2.50.1 In-Reply-To: <20260110165242.38662-1-jon.mason@arm.com> References: <20260110165242.38662-1-jon.mason@arm.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 10 Jan 2026 16:52:45 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/meta-arm/message/6834 Signed-off-by: Jon Mason --- .../boot-wrapper-aarch64/boot-wrapper-aarch64_git.bb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta-arm/recipes-bsp/boot-wrapper-aarch64/boot-wrapper-aarch64_git.bb b/meta-arm/recipes-bsp/boot-wrapper-aarch64/boot-wrapper-aarch64_git.bb index ce31bff43aa4..7bbd0c3c9a51 100644 --- a/meta-arm/recipes-bsp/boot-wrapper-aarch64/boot-wrapper-aarch64_git.bb +++ b/meta-arm/recipes-bsp/boot-wrapper-aarch64/boot-wrapper-aarch64_git.bb @@ -4,7 +4,7 @@ LICENSE = "BSD-3-Clause" LIC_FILES_CHKSUM = "file://LICENSE.txt;md5=bb63326febfb5fb909226c8e7ebcef5c" SRC_URI = "git://git.kernel.org/pub/scm/linux/kernel/git/mark/boot-wrapper-aarch64.git;branch=master;protocol=https" -SRCREV = "ac6742520ded1da30d500f74e8affe86e27cabd5" +SRCREV = "b621b157b42f1fe398520cf499db88aa654c78e2" # boot-wrapper doesn't make releases UPSTREAM_CHECK_COMMITS = "1"