[poky] [EXTERNAL] Re: FitImage cause dependency loop

Daniel Wang Daniel.Wang at intusurg.com
Tue Nov 5 10:10:14 PST 2019


Thank you Matt! I opened an issue as you suggested https://github.com/madisongh/meta-tegra/issues/204. Thank you for you help. Please let me know anything that I can help.

Thanks
-Daniel

________________________________
From: Matt Madison <matt at madison.systems>
Sent: Tuesday, November 5, 2019 6:53:19 AM
To: Daniel Wang <Daniel.Wang at intusurg.com>
Cc: poky at yoctoproject.org <poky at yoctoproject.org>
Subject: [EXTERNAL] Re: [poky] FitImage cause dependency loop

Daniel,

This is a problem in meta-tegra.  I've fixed it in master, but will
need to back-port that change to the warrior branch.  Open an issue at
https://urldefense.proofpoint.com/v2/url?u=https-3A__github.com_madisongh_meta-2Dtegra_issues&d=DwIFaQ&c=zU8zY2zCUszYt_I-pOyd_mv7l16V_LqUcVo_CQ1Hrvg&r=p6vhUY-dW00tLZcI2hebygBMGd7V0lmO5LmKcyXGgOA&m=WUaYSF20syeE7svLN6b6qAGmxg3tbfdxT9u5pHu7Qyw&s=9hTBZqwlqqbatnh2kuuCJ-l9fvmkLSdtitF3boVX1WY&e=  and that will remind me
to take care of it.

Regards,
-Matt

On Wed, Oct 30, 2019 at 12:10 PM Daniel Wang <Daniel.Wang at intusurg.com> wrote:
>
> Hi there,
>
>
>
> I got a question hope some of you can give me an advice. I’m using Yocto Warrior and meta-tegra to build my distro. I want to enable verified boot so I added the following settings.
>
>
>
> KERNEL_CLASSES ?= “ kernel-fitimage ”
>
> KERNEL_IMAGETYPES_append = “ fitImage”
>
> UBOOT_SIGN_KEYDIR = “${TOPDIR}/conf”
>
> UBOOT_SIGN_KEYNAME = “dev”
>
> UBOOT_MKIMAGE_DTCOPTS = “-I dts -O dtb -p 2000”
>
> UBOOT_SIGN_ENABLE  = “1”
>
>
>
> Everything works well without those setting. But as soon as I added those ones Yocto reports a dependency loop (more than 10 matches). Have any of you encountered this issue before how can I fix it? Thank you so much!
>
>
>
> Thanks
>
> -Daniel
>
>
>
> --
> _______________________________________________
> poky mailing list
> poky at yoctoproject.org
> https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.yoctoproject.org_listinfo_poky&d=DwIFaQ&c=zU8zY2zCUszYt_I-pOyd_mv7l16V_LqUcVo_CQ1Hrvg&r=p6vhUY-dW00tLZcI2hebygBMGd7V0lmO5LmKcyXGgOA&m=WUaYSF20syeE7svLN6b6qAGmxg3tbfdxT9u5pHu7Qyw&s=V4cB0EDBDlBrb8vJkCoL3k5AqGk8ar9TeYjFiU7CC0Y&e=

----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
NOTE THAT THIS EMAIL ORIGINATED FROM OUTSIDE OF INTUITIVE SURGICAL..
Be alert for fraudulent emails that spoof internal “@intusurg.com” email addresses.  Report these or other security threats to: ITHelpNow at intusurg.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.yoctoproject.org/pipermail/poky/attachments/20191105/11414271/attachment.html>


More information about the poky mailing list