avr32 machines: remove postprocess hack as newer uboots load uImage from the rootfs
authorKoen Kooi <koen@openembedded.org>
Thu, 24 Jan 2008 08:39:23 +0000 (08:39 +0000)
committerKoen Kooi <koen@openembedded.org>
Thu, 24 Jan 2008 08:39:23 +0000 (08:39 +0000)
conf/machine/at32stk1000.conf
conf/machine/atngw100.conf

index ac63af5..4c3112d 100644 (file)
@@ -23,5 +23,4 @@ EXTRA_IMAGECMD_jffs2 = " --big-endian --pagesize=4096 --eraseblock=65536"
 KERNEL_IMAGETYPE = "uImage"
 PREFERRED_VERSION_u-boot = "1.1.4"
 
-ROOTFS_POSTPROCESS_COMMAND += " rm ${IMAGE_ROOTFS}/boot/uImage* || true;"
 
index 17b4c41..21e256b 100644 (file)
@@ -22,4 +22,3 @@ EXTRA_IMAGECMD_jffs2 = " --big-endian --pagesize=4096 --eraseblock=65536"
 PREFERRED_VERSION_u-boot = "1.1.4"
 KERNEL_IMAGETYPE = "uImage"
 
-ROOTFS_POSTPROCESS_COMMAND += " rm ${IMAGE_ROOTFS}/boot/uImage* || true ;"