I think I found the problem. u-boot-tegra>2016.07.bb calls a function – uboot_make_bootimg during do_compile. The dtb and uboot.bin concatenation happens in do_deploy which does not call that function. Hence the format issue cause cboot to load u-boot. Now I do not know what is the best location to sign the FIT image and put everything together… Thanks -Daniel ________________________________ From: Matt Madison Sent: Tuesday, November 5, 2019 6:53:19 AM To: Daniel Wang Cc: poky@yoctoproject.org Subject: [EXTERNAL] Re: [poky] FitImage cause dependency loop Daniel, This is a problem in meta-tegra. I've fixed it in master, but will need to back-port that change to the warrior branch. Open an issue at https://urldefense.proofpoint.com/v2/url?u=https-3A__github.com_madisongh_meta-2Dtegra_issues&d=DwIFaQ&c=zU8zY2zCUszYt_I-pOyd_mv7l16V_LqUcVo_CQ1Hrvg&r=p6vhUY-dW00tLZcI2hebygBMGd7V0lmO5LmKcyXGgOA&m=WUaYSF20syeE7svLN6b6qAGmxg3tbfdxT9u5pHu7Qyw&s=9hTBZqwlqqbatnh2kuuCJ-l9fvmkLSdtitF3boVX1WY&e= and that will remind me to take care of it. Regards, -Matt On Wed, Oct 30, 2019 at 12:10 PM Daniel Wang wrote: > > Hi there, > > > > I got a question hope some of you can give me an advice. I’m using Yocto Warrior and meta-tegra to build my distro. I want to enable verified boot so I added the following settings. > > > > KERNEL_CLASSES ?= “ kernel-fitimage ” > > KERNEL_IMAGETYPES_append = “ fitImage” > > UBOOT_SIGN_KEYDIR = “${TOPDIR}/conf” > > UBOOT_SIGN_KEYNAME = “dev” > > UBOOT_MKIMAGE_DTCOPTS = “-I dts -O dtb -p 2000” > > UBOOT_SIGN_ENABLE = “1” > > > > Everything works well without those setting. But as soon as I added those ones Yocto reports a dependency loop (more than 10 matches). Have any of you encountered this issue before how can I fix it? Thank you so much! > > > > Thanks > > -Daniel > > > > -- > _______________________________________________ > poky mailing list > poky@yoctoproject.org > https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.yoctoproject.org_listinfo_poky&d=DwIFaQ&c=zU8zY2zCUszYt_I-pOyd_mv7l16V_LqUcVo_CQ1Hrvg&r=p6vhUY-dW00tLZcI2hebygBMGd7V0lmO5LmKcyXGgOA&m=WUaYSF20syeE7svLN6b6qAGmxg3tbfdxT9u5pHu7Qyw&s=V4cB0EDBDlBrb8vJkCoL3k5AqGk8ar9TeYjFiU7CC0Y&e= ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- NOTE THAT THIS EMAIL ORIGINATED FROM OUTSIDE OF INTUITIVE SURGICAL.. Be alert for fraudulent emails that spoof internal “@intusurg.com” email addresses. Report these or other security threats to: ITHelpNow@intusurg.com.