avr32 machines: make uImage hack less fragile
authorKoen Kooi <koen@openembedded.org>
Fri, 30 Nov 2007 20:53:17 +0000 (20:53 +0000)
committerKoen Kooi <koen@openembedded.org>
Fri, 30 Nov 2007 20:53:17 +0000 (20:53 +0000)
conf/machine/at32stk1000.conf
conf/machine/atngw100.conf

index 343c6aa..ac63af5 100644 (file)
@@ -23,5 +23,5 @@ EXTRA_IMAGECMD_jffs2 = " --big-endian --pagesize=4096 --eraseblock=65536"
 KERNEL_IMAGETYPE = "uImage"
 PREFERRED_VERSION_u-boot = "1.1.4"
 
-ROOTFS_POSTPROCESS_COMMAND += " rm ${IMAGE_ROOTFS}/boot/uImage* ;"
+ROOTFS_POSTPROCESS_COMMAND += " rm ${IMAGE_ROOTFS}/boot/uImage* || true;"
 
index 1d402db..17b4c41 100644 (file)
@@ -22,4 +22,4 @@ EXTRA_IMAGECMD_jffs2 = " --big-endian --pagesize=4096 --eraseblock=65536"
 PREFERRED_VERSION_u-boot = "1.1.4"
 KERNEL_IMAGETYPE = "uImage"
 
-ROOTFS_POSTPROCESS_COMMAND += " rm ${IMAGE_ROOTFS}/boot/uImage* ;"
+ROOTFS_POSTPROCESS_COMMAND += " rm ${IMAGE_ROOTFS}/boot/uImage* || true ;"