From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6874889650574458880 X-Received: by 2002:a2e:8693:: with SMTP id l19mr1095868lji.25.1601025190592; Fri, 25 Sep 2020 02:13:10 -0700 (PDT) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a19:554:: with SMTP id 81ls204514lff.1.gmail; Fri, 25 Sep 2020 02:13:09 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzBGCCImEDB3JTdcot5wo/n8aDRSowIPr6eFB7mqDSyMVvKsmvyjCSgNlNZCY017W9i9gx8 X-Received: by 2002:ac2:4a73:: with SMTP id q19mr1123232lfp.569.1601025189236; Fri, 25 Sep 2020 02:13:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601025189; cv=none; d=google.com; s=arc-20160816; b=WDdAqxv/O/TaJeAah9KhBK6ehX8LaRXFjWsG2fI9N2bk8TpVjf6jN49UvEapOP0/b+ kvQTRx8tEEh4P6GKbDqY8NMLBa5Dl1CI+XLZXHhS/oEuNiSfMYZ+P1j4lK+chqVCiqkU sLgN6b0ZoqiudNSsymdQRLP8+VM9Vp657ZzlElSqiYP+M0nV+VzwCdpluL0wSCVlYX5g WvQUFCvzCk6ElJW+MIckb7PmelvqzbakJcdOx0Eo29/khLAA5S88OZHd7x7yHAfUSKTy M11heCOS01vkmq2LkbF8LkeMDxOA9MbNWgZWVOLGBhRReDq8qRe8ag+zVFaukBBKNO8J gLMg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:content-language:in-reply-to:mime-version :user-agent:date:message-id:from:references:to:subject; bh=gWdWntKd78gqtKSw6/aPAMULKw4LxH1vfdQCreH6d94=; b=VHTRhlK4LjCaa/skBveddqvVxEhjzcbJlaYHVP8xBy2tjSU2CKlpm5BZoAA28VdOS2 rMRat09hDum8yK2mrcdk+0y86goW8Z22PL+BTHfdB17Oi8DulFnxDz0ZXlxq5sP0nnU8 L2R+eIdOpghixTqp22Gxp1XUi1ZMnEbVpxMcyDk11BpY6t/I8ZFrUqV3I7zT89n3ra+Y AwVjglA78wpIEejLIyQ6rtJeVi2p9wsTQZ5qE5QZyHkI3OOuKdkBzJM1iMQUrttiSQ+v rHvmm635V3O9mO1nuE8N63lEy35SxgNeH9Rnnbe9zrTDC9vR1FDxvWEHgO14iihM9lf9 kNOw== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 194.138.37.40 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Return-Path: Received: from gecko.sbs.de (gecko.sbs.de. [194.138.37.40]) by gmr-mx.google.com with ESMTPS id q20si43367lji.2.2020.09.25.02.13.09 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Fri, 25 Sep 2020 02:13:09 -0700 (PDT) Received-SPF: pass (google.com: domain of jan.kiszka@siemens.com designates 194.138.37.40 as permitted sender) client-ip=194.138.37.40; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 194.138.37.40 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Received: from mail2.sbs.de (mail2.sbs.de [192.129.41.66]) by gecko.sbs.de (8.15.2/8.15.2) with ESMTPS id 08P9D7Nv001980 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 25 Sep 2020 11:13:07 +0200 Received: from [139.22.133.254] ([139.22.133.254]) by mail2.sbs.de (8.15.2/8.15.2) with ESMTP id 08P9D6rZ021334; Fri, 25 Sep 2020 11:13:06 +0200 Subject: Re: [PATCH v2 3/3] Add custom isar-initramfs example To: Harald Seiler , isar-users@googlegroups.com References: <20200921104212.1387227-1-hws@denx.de> <20200923162046.206888-3-hws@denx.de> From: Jan Kiszka Message-ID: Date: Fri, 25 Sep 2020 11:13:06 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.12.0 MIME-Version: 1.0 In-Reply-To: <20200923162046.206888-3-hws@denx.de> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-TUID: YGwNaxDUBWyA On 23.09.20 18:20, Harald Seiler wrote: > isar-initramfs is a custom initramfs which additionally has the > initramfs-example module installed. > > Signed-off-by: Harald Seiler > --- > > Notes: > Maybe this initramfs should be tested in CI somewhere? I'm unsure what > makes sense, and how to "force" this custom initramfs into a CI target. > > .../recipes-initramfs/images/isar-initramfs.bb | 18 ++++++++++++++++++ > 1 file changed, 18 insertions(+) > create mode 100644 meta-isar/recipes-initramfs/images/isar-initramfs.bb > > diff --git a/meta-isar/recipes-initramfs/images/isar-initramfs.bb b/meta-isar/recipes-initramfs/images/isar-initramfs.bb > new file mode 100644 > index 000000000000..aaa0350aab20 > --- /dev/null > +++ b/meta-isar/recipes-initramfs/images/isar-initramfs.bb > @@ -0,0 +1,18 @@ > +# Example of a custom initramfs image recipe. The image will be deployed to > +# > +# build/tmp/deploy/images/${MACHINE}/isar-initramfs-${DISTRO}-${MACHINE}.initrd.img > +# > +# This software is a part of ISAR. > + > +inherit initramfs > + > +# Debian packages that should be installed into the system for building the > +# initramfs. E.g. the cryptsetup package which contains initramfs scripts for > +# decrypting a root filesystem. > +INITRAMFS_PREINSTALL += " \ > + " > + > +# Recipes that should be installed into the initramfs build rootfs. > +INITRAMFS_INSTALL += " \ > + initramfs-example \ > + " > If this recipe is not pulled somewhere, it's dead. Some test-only dependencies we had to local.conf in scripts/ci_build.sh. Or you add it to meta-isar/conf/local.conf.sample. If added, will it simply replace the default initramfs? Or is more needed? Jan -- Siemens AG, Corporate Technology, CT RDA IOT SES-DE Corporate Competence Center Embedded Linux