From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 7252203608347770880 X-Received: by 2002:a05:600c:1d8c:b0:3fa:9766:74d with SMTP id p12-20020a05600c1d8c00b003fa9766074dmr7677881wms.4.1689610164713; Mon, 17 Jul 2023 09:09:24 -0700 (PDT) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a05:600c:1c1e:b0:3fb:422d:5011 with SMTP id j30-20020a05600c1c1e00b003fb422d5011ls1530969wms.1.-pod-prod-06-eu; Mon, 17 Jul 2023 09:09:23 -0700 (PDT) X-Google-Smtp-Source: APBJJlFw4QDhY3R575oI3icv7ry25U8qfAVUjC6WFjNXrTlJD/L2vAKsh3m9OVGBrNy3FhxuAhVp X-Received: by 2002:a7b:c3d8:0:b0:3f6:91c:4e86 with SMTP id t24-20020a7bc3d8000000b003f6091c4e86mr9722480wmj.3.1689610162942; Mon, 17 Jul 2023 09:09:22 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1689610162; cv=pass; d=google.com; s=arc-20160816; b=xqoQ1/9KlWurssTMyEKdF0umV8H2ZrQ7YINp0dw3xP+t0nN0gC0I/Iuxa0I1lBLj4X nx19LLVmzgjkE64hnoTrnhWRWTv+GWrg4kKjm8jkcYT9Je4R5EB2LvGUAyVbkgY3MUE+ BmuBC7Vpc82RGgsXO1PGwbkO0ThACTQRQYdv6byc5q4aMHBcuk72KqdqX1mg4JkFV0Fj dsR0rrP+8MsU3p1tjlnIjJwx4wvouFH9m8ytiWCDR8wwst0fw2Ju0ZXydpk9oVdFrMMw idPgi2SEhZmJLxbSrEhCfOf9bAaa1JzWmLLmtaDKRI/QHH1Eed9RzagynFjMPbperD0d mNvg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:content-transfer-encoding:in-reply-to:from:references :cc:to:content-language:subject:user-agent:date:message-id :dkim-signature; bh=Vn5STVJY2LPXtBXLjMf5b4W0vIHTnJy21zRUuYHkgfU=; fh=sMH6kOCT33P4TRGPHaa4jjAtFiS0nlKKNaXSf3h3mwk=; b=FZ3Am7icnPjoRklwqJRgjjXnfMrK01XzuDvxZh8vOMpmdEy1+kGRWpnkZ9IvGDsG2N GUcBcoXk5F2/v4L02c8sax1Ud95PO0qsqbzrG7d+kv5OxiDC/tmQxT5LehGWFUVhNx4Z 2P65b3r8BMY3tCkp5CSWyBcoQafVqDB7GFpsr7gaDEUHxumDkFT6Te4jzpn8Op7LJTsS UJb4F4vt6ePIjjUAigahcGFSf2XZVEKTtvyqzSeOUAlgCu1V1RjhllnnRBxr7sI5ZHHg l2hio+TBUh2EzZCONJ3R9PgtWw2tgY/CQZw1jNfd926Ew5FhsSmUs+Sp5v51BsrBQK2W IFOQ== ARC-Authentication-Results: i=2; gmr-mx.google.com; dkim=pass header.i=@siemens.com header.s=selector2 header.b=sMLSqQw3; arc=pass (i=1 spf=pass spfdomain=siemens.com dkim=pass dkdomain=siemens.com dmarc=pass fromdomain=siemens.com); spf=pass (google.com: domain of jan.kiszka@siemens.com designates 2a01:111:f400:fe0e::62e as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=siemens.com Return-Path: Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-vi1eur04on062e.outbound.protection.outlook.com. [2a01:111:f400:fe0e::62e]) by gmr-mx.google.com with ESMTPS id n18-20020a05600c501200b003fbf22a6ddcsi9318wmr.1.2023.07.17.09.09.22 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Mon, 17 Jul 2023 09:09:22 -0700 (PDT) Received-SPF: pass (google.com: domain of jan.kiszka@siemens.com designates 2a01:111:f400:fe0e::62e as permitted sender) client-ip=2a01:111:f400:fe0e::62e; Authentication-Results: gmr-mx.google.com; dkim=pass header.i=@siemens.com header.s=selector2 header.b=sMLSqQw3; arc=pass (i=1 spf=pass spfdomain=siemens.com dkim=pass dkdomain=siemens.com dmarc=pass fromdomain=siemens.com); spf=pass (google.com: domain of jan.kiszka@siemens.com designates 2a01:111:f400:fe0e::62e as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=siemens.com ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=KgQNl2MKnF1tO+RLipcDUXH4emt6ufLU39xl/mdMShoxXWo1NCuZyNzRYzztXEGOHlJ2vlh4CWu4auwT/kMFtJgjjvzHqSmmaLacxtx3sw4xqgvCCFwZ+PElHOVIkg0PdLDTth+WrhdiuP+87MXXORXnWQIT28TWanFNyA85LIFznJmEh5M6XYsNzudNNGNOe1Qilu5U81gzskdFXrNGXvEZflDVTRKlxNlzyniesvybznLpK03T2RtA7E+l+02wnb98z0o+4XURbr8NLOFvExn9Uw791MCnWgCfKhGEEvo0gaVAnuGv/yKHxt//uAxqp/zZ400uqnbIViAGYVc7Bg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Vn5STVJY2LPXtBXLjMf5b4W0vIHTnJy21zRUuYHkgfU=; b=YpEhI2Rl4Ftt7PEiPdtwLn1+xnq82+nJtSQyW8ekmSpaVyn65pyKydcx1P4Gjq2ravRVkyOWNExG7wzDG4wyf9Msn4l5xAKAyuXxyeHMlP1CPNpjCUsoGGd8HsTgVJ/8xyLfihUlUp07ARF2gjlv/I5xwg7m46cDY1qy41G/KriHnOMAFIC4qs1yPl3f1VwCLTM8H4Geq4jul1hsQ2FoKI2/B34eDaJjvYkCxhM+VfQnUSHCE0oNPbNsO5I6hPqmshHtj/a70J5b4Ug7rfg4kzmHiuhZJXPXK9fOHGwvOcR9nvIdELYjoN9+7PKXwV2HqEPMOyiWUhbhNeLoBp5LrQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=siemens.com; dmarc=pass action=none header.from=siemens.com; dkim=pass header.d=siemens.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=siemens.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Vn5STVJY2LPXtBXLjMf5b4W0vIHTnJy21zRUuYHkgfU=; b=sMLSqQw3laXZsfxWddRFP96EiKjDP4S+RMs9IKGLa3EwcSDVpXuVP3ZO/Gxu8MSsuqIz3Oa+5E/CFPrVI/4nqWUmVvSQjvegUQNOCKniKR2IvqfJTK9uAXdD2NlAMzvKwDjSI/OTXA/hrwZcZrMttfWG5vxrcTmjaye9UZsmkPq5cwJdotV2lUgs1sSBcAQBoWyEvU/GMn//yAYWzYTjg94X0jFsXxRGgDQ6VLowelIs/1F1t1uudFqFE6y3UdXiOKZoqwhYtDMTkIs58ukysr/3GSzprGI4NJgqhMRiuBjzpk0eO3T1vDxq0uPHqdX0DO3DliS3PtN6eD/8vgCq+Q== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=siemens.com; Received: from AS4PR10MB6181.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:20b:588::19) by VI1PR10MB8279.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:800:119::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6588.31; Mon, 17 Jul 2023 16:09:21 +0000 Received: from AS4PR10MB6181.EURPRD10.PROD.OUTLOOK.COM ([fe80::77d2:3a68:9741:67cf]) by AS4PR10MB6181.EURPRD10.PROD.OUTLOOK.COM ([fe80::77d2:3a68:9741:67cf%4]) with mapi id 15.20.6588.031; Mon, 17 Jul 2023 16:09:21 +0000 Message-ID: <1090ef54-0007-4cb0-f285-cd6080fcf87f@siemens.com> Date: Mon, 17 Jul 2023 18:09:14 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.12.0 Subject: Re: [PATCH v3 6/7] initramfs: Add recipe for tee-supplicant hook Content-Language: en-US To: baocheng.su@siemens.com, isar-users@googlegroups.com Cc: felix.moessbauer@siemens.com, christian.storm@siemens.com, quirin.gylstorff@siemens.com, baocheng_su@163.com, henning.schild@siemens.com References: <20230705053340.1158024-1-baocheng.su@siemens.com> <20230705053340.1158024-7-baocheng.su@siemens.com> From: Jan Kiszka In-Reply-To: <20230705053340.1158024-7-baocheng.su@siemens.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-ClientProxiedBy: FR0P281CA0087.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:1e::12) To AS4PR10MB6181.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:20b:588::19) Return-Path: jan.kiszka@siemens.com MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: AS4PR10MB6181:EE_|VI1PR10MB8279:EE_ X-MS-Office365-Filtering-Correlation-Id: 5a96f92e-7fc0-454f-f3ca-08db86e02e44 X-LD-Processed: 38ae3bcd-9579-4fd4-adda-b42e1495d55a,ExtAddr X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AS4PR10MB6181.EURPRD10.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230028)(4636009)(376002)(346002)(136003)(396003)(39860400002)(366004)(451199021)(8676002)(82960400001)(41300700001)(44832011)(86362001)(5660300002)(8936002)(38100700002)(316002)(4326008)(83380400001)(2616005)(66556008)(66476007)(66946007)(31686004)(2906002)(31696002)(36756003)(478600001)(107886003)(6486002)(6666004)(6512007)(53546011)(186003)(26005)(6506007)(43740500002)(45980500001);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?TWxnb3c1aFJTcWdadURzUFdUZkU3ZVJKNDJvbU1vWXJRdmFmTm0rQXd2eHdm?= =?utf-8?B?OFZ2RmIzanVjcUZFMXdHVG1jMk9EVTZwSlNlMGdzbkNiZmlHOVpDRVh6eG5v?= =?utf-8?B?YmhsWTd4TGlGNndDV1RHZzNNSVpWR0FCYVRwQlJWNEZKc0pUN2t2b1p3VERK?= =?utf-8?B?WUFxbHZlM1dJMEdUT0lSNzVPeEVMOURtYXh0VFNxYlpJVHNocGF0SS82b3RZ?= =?utf-8?B?NkFTNzFXVnJEdHNZb2pRLzY5SmtwZ3IyV0Q3Z2J3TTFxOFlNbnZkY1g4RUNr?= =?utf-8?B?RVlmZ0VvSnRwZU1NbElUb1FlblZkRHJoa2YzNXhxa1VxQS9EdTZBckEyMEcx?= =?utf-8?B?Z256NUFnT2V5UHRRclBjbjI4ZlBud2NMV1B6M3VFNUNrbWpTVDloMnBpNURo?= =?utf-8?B?dEZyYmVTU0RZQlM5UXlMS0crUURYQlFQalFMQXprTUZLREJuaENUQkpkSDF3?= =?utf-8?B?ZkJ2OG9QMmhMZjRaUi9mcHVyR2RBKytPYmhlSU5aR05YTy9rSmdRM1dwUGZK?= =?utf-8?B?a3hsdGJLbFcxNm1MSVpYdkVLSGY0ZGhIbEVyV3NzQmZWYk1UM0N6SHk3SDMy?= =?utf-8?B?ZUVTYzYwb2daalN0ZE1XQ1loRkFBRVVDeFM2WjhHSFR2L3d6dmJnY3BqSFpG?= =?utf-8?B?Y0l5aFhmSThjSVo4OGtzU29zM0crTGxieUROSTJiUjJlTTg5UjBzQVc3c1pX?= =?utf-8?B?L0xUc2JLaFdvZDIzblB2R3QzWWdreWVGaUZlZHpDOVlIcnhhSG4rVk4zQlk1?= =?utf-8?B?NTVuRUdITzkzZEZnRFYvd0pqZCtJZGhkMmVTWnZTQjM5K29PU09aTXNVNHlW?= =?utf-8?B?RHEyeWxFd2FmQVdQOW9NMzVHZVBzU2xubVFFWVBpOUhsdlprU2o0a01JSGUv?= =?utf-8?B?Z21aYk5OY05TdnJtejBYOGNnRkJtc0g1T2pldlRNS2pHWE5NSG5BM3NYN3p2?= =?utf-8?B?N0RudG93VEFqTndyY1dqV1J6Y2QvVWV0TkhTYXlTOVJLa1RzRzVsU0RId1Qy?= =?utf-8?B?am1XM0wvNnNpS2RGSkZYRlB3RG9jY3MzRnc0VXJqYVZ4eDBGMXB6cjhHRUtX?= =?utf-8?B?elpId0F1VzQ0M2EyV05TOUpLeEdXNHBvMWJwbDY0REtJaENOdmhpcjhtWnlT?= =?utf-8?B?TFZ5VW5yMHR5N0Z0S2x2TC9FUm80ZzZST2F6K2EzczExM2lISmZyOWRFODVR?= =?utf-8?B?emZnTnpwdVBDakFPQXlnMFMyWS9mV29USDZ6K3dpaUNDQmliZnV3YjdjRkFD?= =?utf-8?B?aS9XVkcrcy9SZ2hJSzZPbExkUjdxN0ZkdVlKRHV4K1B2dURTcU9mNE1adGw0?= =?utf-8?B?bjh3dFNnVTk1TDlDeHZQV2hQbGNMblI5akM2a0dqT0ZOeXg1MWpEZGo5WW53?= =?utf-8?B?am1iZUpHUlFFVWFnbnQyZjVKS0RTQlplK3FmdGpCMDgvd3J0OVBXQWRqRkJF?= =?utf-8?B?WmowcmhWWEpvUEZBYll1NU10QWE3R3JTWUlnWHhLc3JQbTc2RW9mS003SVN0?= =?utf-8?B?UWUyUUhpOHhwNmUzZ2RodzU3ZmF5N3QreDlEMlZ0azZlR1kvejVqUGZGZkNp?= =?utf-8?B?NDFqUWtMWWYzemRHazFEdTJEamtKeUxaVGxJQXNNb3NFMlFUZWNLOFI4L0tR?= =?utf-8?B?NnBkNEN2a0ZBVUpMVXlZQVRrOWQ4alhQYk5PYUJaZldhb1JoS3JoLzVNczh0?= =?utf-8?B?dzRWV2N5VW5jQUNLQUx0TU9QVUYxUHBmK3N5U1RyTytLU3ljTGlOOFR3VUND?= =?utf-8?B?dEZoeXNoR3ZtRHlJVktBQ1BIUVNOSWlkenM0T1ZzcUJQNEhwUzErRFJWVHNy?= =?utf-8?B?MVJDVFpRYldLZkhwZU5ZMC80WjlmOEtuMzFKUkJpVlBETmFabnVKaVAvNkJC?= =?utf-8?B?dEdPcGQ5NG55Mnl0aXJxVHRKZnNwbTNBNFFwZ3BqanJtREQ3aVlBajMyMWx2?= =?utf-8?B?S29ZWnBYYjJ4ZlhRdjZqWjZrcFlza3IzbHRKbzZDQ3NIL3NxVXZMdVZ2eWc0?= =?utf-8?B?UnphY3dlanhaaFdMTC9XVHRqcE9iaXk1bW5iOGRxWkRYTTc2dWxmZzE3VUtI?= =?utf-8?B?ekNWN2J0a2lldTdyT2Y4SkJKdjcwV1YrU2x4b2VLUlVHcWFCVnltbm9mOU5u?= =?utf-8?B?c1hsMTdEcXVZYTZ3N3JJZWNjT21YY2hVRXdNTFJzbWx6dkcraWx4M1d2Ynlq?= =?utf-8?B?QWc9PQ==?= X-OriginatorOrg: siemens.com X-MS-Exchange-CrossTenant-Network-Message-Id: 5a96f92e-7fc0-454f-f3ca-08db86e02e44 X-MS-Exchange-CrossTenant-AuthSource: AS4PR10MB6181.EURPRD10.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Jul 2023 16:09:21.1729 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 38ae3bcd-9579-4fd4-adda-b42e1495d55a X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: 7SFxOTmV80asBwuSaJI/mGp8jw0L11pRbratUZrDf6ZZWN6cOcT9hTul5CZOaWW/v0P5u0xvNKgrnux/TVHtSw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR10MB8279 X-TUID: hyffjQUJzXb9 On 05.07.23 07:33, baocheng.su@siemens.com wrote: > From: Baocheng Su > > This adds the tee-supplicant hook so that the tee supplicant daemon is > started at the initrd stage. > > The tee-supplicant daemon is used to provide service to trust > applications running in optee, for example to provide RPMB access > service for StMM or fTPM TAs. > > By running tee-supplicant at initrd stage, disk encryption based on fTPM > is possible. > > stm32mp15x is used to demo the building of this hook, so add a new ci > target for the initramfs image of stm32mp15x. > > Signed-off-by: Baocheng Su > --- > .../images/stm32mp15x-initramfs.bb | 14 ++++++++ > .../files/tee-supplicant.hook | 33 +++++++++++++++++++ > .../files/tee-supplicant.script | 33 +++++++++++++++++++ > .../initramfs-tee-supplicant-hook_0.1.bb | 27 +++++++++++++++ > testsuite/citest.py | 1 + > 5 files changed, 108 insertions(+) > create mode 100644 meta-isar/recipes-initramfs/images/stm32mp15x-initramfs.bb > create mode 100644 meta/recipes-initramfs/initramfs-tee-supplicant-hook/files/tee-supplicant.hook > create mode 100644 meta/recipes-initramfs/initramfs-tee-supplicant-hook/files/tee-supplicant.script > create mode 100644 meta/recipes-initramfs/initramfs-tee-supplicant-hook/initramfs-tee-supplicant-hook_0.1.bb > > diff --git a/meta-isar/recipes-initramfs/images/stm32mp15x-initramfs.bb b/meta-isar/recipes-initramfs/images/stm32mp15x-initramfs.bb > new file mode 100644 > index 0000000..211c201 > --- /dev/null > +++ b/meta-isar/recipes-initramfs/images/stm32mp15x-initramfs.bb > @@ -0,0 +1,14 @@ > +# > +# Copyright (c) Siemens AG, 2023 > +# > +# Authors: > +# Su Bao Cheng > +# > +# SPDX-License-Identifier: MIT > +# > + > +inherit initramfs > + > +INITRAMFS_INSTALL += " \ > + initramfs-tee-supplicant-hook \ > + " > diff --git a/meta/recipes-initramfs/initramfs-tee-supplicant-hook/files/tee-supplicant.hook b/meta/recipes-initramfs/initramfs-tee-supplicant-hook/files/tee-supplicant.hook > new file mode 100644 > index 0000000..0af277b > --- /dev/null > +++ b/meta/recipes-initramfs/initramfs-tee-supplicant-hook/files/tee-supplicant.hook > @@ -0,0 +1,33 @@ > +#!/bin/sh > +# Copyright (c) Siemens AG, 2023 > +# > +# Authors: > +# Su Bao Cheng > +# > +# SPDX-License-Identifier: MIT > +# > +PREREQ="" > +prereqs() > +{ > + echo "$PREREQ" > +} > +case $1 in > +prereqs) > + prereqs > + exit 0 > + ;; > +esac > + > +. /usr/share/initramfs-tools/hook-functions > + > +hook_error() { > + echo "(ERROR): $2" >&2 > + exit 1 > +} > + > +# For stock debian bookworm arm64 kernel, these two .ko exist, but not built-in. > +manual_add_modules tee > +manual_add_modules optee > + > +copy_exec /usr/sbin/tee-supplicant || hook_error "/usr/sbin/tee-supplicant not found" > +copy_exec /usr/bin/pgrep || hook_error "/usr/bin/pgrep not found" > diff --git a/meta/recipes-initramfs/initramfs-tee-supplicant-hook/files/tee-supplicant.script b/meta/recipes-initramfs/initramfs-tee-supplicant-hook/files/tee-supplicant.script > new file mode 100644 > index 0000000..bb6dcc1 > --- /dev/null > +++ b/meta/recipes-initramfs/initramfs-tee-supplicant-hook/files/tee-supplicant.script > @@ -0,0 +1,33 @@ > +#!/bin/sh > +# Copyright (c) Siemens AG, 2023 > +# > +# Authors: > +# Su Bao Cheng > +# > +# SPDX-License-Identifier: MIT > +# > +PREREQ="" > +prereqs() > +{ > + echo "$PREREQ" > +} > +case $1 in > +prereqs) > + prereqs > + exit 0 > + ;; > +esac > + > +. /scripts/functions > + > +/usr/sbin/tee-supplicant -d > + > +# The tee-supplicant would take some time to be discovered, 10 seconds should be > +# enough > +wait_sec=10 > +until test $wait_sec -eq 0 || test -c "${FTPM_DEV}" ; do > + wait_sec=$((wait_sec-1)) > + sleep 1 > +done > + > +/usr/bin/pgrep tee-supplicant > /dev/null || panic "Can't start the tee-supplicant daemon!" > diff --git a/meta/recipes-initramfs/initramfs-tee-supplicant-hook/initramfs-tee-supplicant-hook_0.1.bb b/meta/recipes-initramfs/initramfs-tee-supplicant-hook/initramfs-tee-supplicant-hook_0.1.bb > new file mode 100644 > index 0000000..3768b8e > --- /dev/null > +++ b/meta/recipes-initramfs/initramfs-tee-supplicant-hook/initramfs-tee-supplicant-hook_0.1.bb > @@ -0,0 +1,27 @@ > +# Copyright (c) Siemens AG, 2023 > +# > +# Authors: > +# Su Bao Cheng > +# > +# SPDX-License-Identifier: MIT > +# > + > +inherit dpkg-raw > + > +SRC_URI += " \ > + file://tee-supplicant.hook \ > + file://tee-supplicant.script \ > + " > + > +DEBIAN_DEPENDS = "initramfs-tools, tee-supplicant, procps" > + > +do_install[cleandirs] += " \ > + ${D}/usr/share/initramfs-tools/hooks \ > + ${D}/usr/share/initramfs-tools/scripts/local-bottom" > + > +do_install() { > + install -m 0755 "${WORKDIR}/tee-supplicant.hook" \ > + "${D}/usr/share/initramfs-tools/hooks/tee-supplicant" > + install -m 0755 "${WORKDIR}/tee-supplicant.script" \ > + "${D}/usr/share/initramfs-tools/scripts/local-bottom/tee-supplicant" > +} > diff --git a/testsuite/citest.py b/testsuite/citest.py > index 17a9024..1aa2928 100755 > --- a/testsuite/citest.py > +++ b/testsuite/citest.py > @@ -214,6 +214,7 @@ class NoCrossTest(CIBaseTest): > 'mc:bananapi-bullseye:isar-image-base', > 'mc:nanopi-neo-bullseye:isar-image-base', > 'mc:stm32mp15x-bullseye:isar-image-base', > + 'mc:stm32mp15x-bullseye:stm32mp15x-initramfs', Argh, this is why I get nothing of the initramfs in the final image. But this is not helpful. We need the initramfs for the integrated image. Jan -- Siemens AG, Technology Competence Center Embedded Linux