/openbmc/openbmc/poky/meta/recipes-multimedia/speex/ |
H A D | speexdsp_1.2.1.bb | 21 # speexdsp was split off from speex in 1.2rc2. Older versions of speex can't 23 RCONFLICTS:${PN} = "speex (< 1.2rc2)" 24 RCONFLICTS:${PN}-dbg = "speex-dbg (< 1.2rc2)" 25 RCONFLICTS:${PN}-dev = "speex-dev (< 1.2rc2)" 26 RCONFLICTS:${PN}-staticdev = "speex-staticdev (< 1.2rc2)"
|
/openbmc/linux/fs/ecryptfs/ |
H A D | read_write.c | 188 int rc2; in ecryptfs_write() local 190 rc2 = ecryptfs_write_inode_size_to_metadata( in ecryptfs_write() 192 if (rc2) { in ecryptfs_write() 195 "rc = [%d]\n", rc2); in ecryptfs_write() 197 rc = rc2; in ecryptfs_write()
|
/openbmc/linux/drivers/net/ethernet/sfc/ |
H A D | ef10_sriov.c | 559 int rc = 0, rc2 = 0; in efx_ef10_sriov_set_vf_vlan() local 623 rc2 = efx_ef10_vport_add_mac(efx, vf->vport_id, vf->mac); in efx_ef10_sriov_set_vf_vlan() 624 if (rc2) { in efx_ef10_sriov_set_vf_vlan() 631 rc2 = efx_ef10_evb_port_assign(efx, vf->vport_id, vf_i); in efx_ef10_sriov_set_vf_vlan() 632 if (rc2) in efx_ef10_sriov_set_vf_vlan() 639 rc2 = efx_ef10_vadaptor_alloc(vf->efx, EVB_PORT_ID_ASSIGNED); in efx_ef10_sriov_set_vf_vlan() 640 if (rc2) in efx_ef10_sriov_set_vf_vlan() 646 rc2 = vf->efx->type->filter_table_probe(vf->efx); in efx_ef10_sriov_set_vf_vlan() 647 if (rc2) in efx_ef10_sriov_set_vf_vlan() 652 rc2 = efx_net_open(vf->efx->net_dev); in efx_ef10_sriov_set_vf_vlan() [all …]
|
H A D | tc_counters.c | 136 int rc, rc2; in efx_tc_flower_allocate_counter() local 162 rc2 = efx_mae_free_counter(efx, cnt); in efx_tc_flower_allocate_counter() 163 if (rc2) in efx_tc_flower_allocate_counter() 166 cnt->fw_id, rc2); in efx_tc_flower_allocate_counter()
|
/openbmc/openbmc/poky/meta/recipes-kernel/linux/ |
H A D | cve-exclusion_6.12.inc | 13 CVE_STATUS[CVE-2003-1604] = "fixed-version: Fixed from version 2.6.12rc2" 23 CVE_STATUS[CVE-2006-6128] = "fixed-version: Fixed from version 2.6.19rc2" 27 CVE_STATUS[CVE-2007-4774] = "fixed-version: Fixed from version 2.6.12rc2" 75 CVE_STATUS[CVE-2012-0957] = "fixed-version: Fixed from version 3.7rc2" 81 CVE_STATUS[CVE-2012-2137] = "fixed-version: Fixed from version 3.5rc2" 105 CVE_STATUS[CVE-2012-3412] = "fixed-version: Fixed from version 3.6rc2" 175 CVE_STATUS[CVE-2012-6647] = "fixed-version: Fixed from version 3.6rc2" 249 CVE_STATUS[CVE-2013-1828] = "fixed-version: Fixed from version 3.9rc2" 275 CVE_STATUS[CVE-2013-2015] = "fixed-version: Fixed from version 3.8rc2" 333 CVE_STATUS[CVE-2013-2889] = "fixed-version: Fixed from version 3.12rc2" [all …]
|
H A D | cve-exclusion_6.6.inc | 13 CVE_STATUS[CVE-2003-1604] = "fixed-version: Fixed from version 2.6.12rc2" 23 CVE_STATUS[CVE-2006-6128] = "fixed-version: Fixed from version 2.6.19rc2" 27 CVE_STATUS[CVE-2007-4774] = "fixed-version: Fixed from version 2.6.12rc2" 75 CVE_STATUS[CVE-2012-0957] = "fixed-version: Fixed from version 3.7rc2" 81 CVE_STATUS[CVE-2012-2137] = "fixed-version: Fixed from version 3.5rc2" 105 CVE_STATUS[CVE-2012-3412] = "fixed-version: Fixed from version 3.6rc2" 175 CVE_STATUS[CVE-2012-6647] = "fixed-version: Fixed from version 3.6rc2" 249 CVE_STATUS[CVE-2013-1828] = "fixed-version: Fixed from version 3.9rc2" 275 CVE_STATUS[CVE-2013-2015] = "fixed-version: Fixed from version 3.8rc2" 333 CVE_STATUS[CVE-2013-2889] = "fixed-version: Fixed from version 3.12rc2" [all …]
|
H A D | cve-exclusion_6.10.inc | 13 CVE_STATUS[CVE-2003-1604] = "fixed-version: Fixed from version 2.6.12rc2" 23 CVE_STATUS[CVE-2006-6128] = "fixed-version: Fixed from version 2.6.19rc2" 27 CVE_STATUS[CVE-2007-4774] = "fixed-version: Fixed from version 2.6.12rc2" 75 CVE_STATUS[CVE-2012-0957] = "fixed-version: Fixed from version 3.7rc2" 81 CVE_STATUS[CVE-2012-2137] = "fixed-version: Fixed from version 3.5rc2" 105 CVE_STATUS[CVE-2012-3412] = "fixed-version: Fixed from version 3.6rc2" 175 CVE_STATUS[CVE-2012-6647] = "fixed-version: Fixed from version 3.6rc2" 249 CVE_STATUS[CVE-2013-1828] = "fixed-version: Fixed from version 3.9rc2" 275 CVE_STATUS[CVE-2013-2015] = "fixed-version: Fixed from version 3.8rc2" 333 CVE_STATUS[CVE-2013-2889] = "fixed-version: Fixed from version 3.12rc2" [all …]
|
/openbmc/linux/Documentation/maintainer/ |
H A D | messy-diffstat.rst | 23 ... vM --- vN-rc1 --- vN-rc2 --- vN-rc3 --- ... --- vN-rc7 --- vN 28 $ git diff --stat --summary vN-rc2..vN-rc3 38 ... vM --- vN-rc1 --- vN-rc2 --- vN-rc3 --- ... --- vN-rc7 --- vN 48 ... vM --- vN-rc1 --- vN-rc2 --- vN-rc3 --- ... --- vN-rc7 --- vN 54 Our maintainer has created one branch at vN-rc1 and another at vN-rc2; the 64 and the second origin end point (vN-rc2), which is certainly not what our 80 ... vM --- vN-rc1 --- vN-rc2 --- vN-rc3 --- ... --- vN-rc7 --- vN
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/collectd/collectd/ |
H A D | collectd.init | 194 rc2="$?" 195 case "$rc2" in
|
/openbmc/linux/drivers/gpu/drm/ci/xfails/ |
H A D | rockchip-rk3288-skips.txt | 7 # Started hanging the machine on Linux 5.19-rc2: 21 # CPU: 3 PID: 482 Comm: kms_plane_lowre Tainted: G W 5.19.0-rc2-323596-g00535de92171…
|
/openbmc/linux/security/selinux/ |
H A D | avc.c | 1035 int rc = 0, rc2; in avc_has_extended_perms() local 1091 rc2 = avc_xperms_audit(ssid, tsid, tclass, requested, in avc_has_extended_perms() 1093 if (rc2) in avc_has_extended_perms() 1094 return rc2; in avc_has_extended_perms() 1194 int rc, rc2; in avc_has_perm() local 1199 rc2 = avc_audit(ssid, tsid, tclass, requested, &avd, rc, in avc_has_perm() 1201 if (rc2) in avc_has_perm() 1202 return rc2; in avc_has_perm()
|
/openbmc/linux/arch/powerpc/mm/book3s64/ |
H A D | hash_pgtable.c | 121 int rc2 = htab_remove_mapping(start, start + page_size, in hash__vmemmap_create_mapping() local 124 BUG_ON(rc2 && (rc2 != -ENOENT)); in hash__vmemmap_create_mapping()
|
/openbmc/openbmc/poky/meta/recipes-core/udev/eudev/ |
H A D | 0001-random-util.c-sync-dev_urandom-implementation-to-sys.patch | 12 v5.18-rc2 with the commit: 15 With this, when we use the linux v5.18-rc2 or later, 26 this will block when the kernel version is v5.18-rc2 or later
|
/openbmc/u-boot/board/technexion/pico-imx6ul/ |
H A D | README | 104 Image Name: Linux-4.19.0-rc2-next-20180905-0 149 U-Boot SPL 2018.09-rc2-00156-g8c46f15-dirty (Sep 05 2018 - 16:24:05 -0300) 152 [ 0.000000] Linux version 4.19.0-rc2-next-20180905-00001-gb805e2d (fabio@fabio-Latitude-E5450) (…
|
/openbmc/u-boot/board/bosch/shc/ |
H A D | README | 79 U-Boot SPL 2016.05-rc2-00016-gf23b960-dirty (Apr 26 2016 - 09:02:18) 105 U-Boot 2016.05-rc2-00016-gf23b960-dirty (Apr 26 2016 - 09:02:18 +0200)
|
/openbmc/openbmc/meta-phosphor/recipes-connectivity/openssl/ |
H A D | openssl_%.bbappend | 9 no-rc2 \
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-support/strongswan/ |
H A D | strongswan_6.0.0.bb | 49 PACKAGECONFIG[rc2] = "--enable-rc2,--disable-rc2,,${PN}-plugin-rc2"
|
/openbmc/linux/drivers/net/ethernet/ibm/ |
H A D | ibmveth.c | 796 int rc1 = 0, rc2 = 0; in ibmveth_set_csum_offload() local 868 rc2 = ibmveth_open(dev); in ibmveth_set_csum_offload() 870 return rc1 ? rc1 : rc2; in ibmveth_set_csum_offload() 878 int rc1 = 0, rc2 = 0; in ibmveth_set_tso() local 928 rc2 = ibmveth_open(dev); in ibmveth_set_tso() 930 return rc1 ? rc1 : rc2; in ibmveth_set_tso() 939 int rc1 = 0, rc2 = 0; in ibmveth_set_features() local 950 rc2 = ibmveth_set_tso(dev, large_send); in ibmveth_set_features() 951 if (rc2 && !adapter->large_send) in ibmveth_set_features() 956 return rc1 ? rc1 : rc2; in ibmveth_set_features()
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/sigrok/libsigrokdecode/ |
H A D | python39.patch | 26 2.24.0.rc2
|
/openbmc/u-boot/doc/SPI/ |
H A D | README.ftssp010_spi_test | 4 U-Boot 2014.01-rc2-g3444b6f (Dec 20 2013 - 10:58:40)
|
/openbmc/linux/Documentation/ABI/stable/ |
H A D | procfs-audit_loginuid | 3 KernelVersion: 2.6.11-rc2 1e2d1492e178 ("[PATCH] audit: handle loginuid through proc")
|
/openbmc/linux/net/llc/ |
H A D | llc_conn.c | 443 int rc2 = (*next_action)(sk, skb); in llc_exec_conn_trans_actions() local 445 if (rc2 == 2) { in llc_exec_conn_trans_actions() 446 rc = rc2; in llc_exec_conn_trans_actions() 448 } else if (rc2) in llc_exec_conn_trans_actions()
|
/openbmc/linux/Documentation/ABI/removed/ |
H A D | sysfs-selinux-disable | 3 KernelVersion: 2.6.12-rc2 (predates git)
|
H A D | sysfs-selinux-checkreqprot | 3 KernelVersion: 2.6.12-rc2 (predates git)
|
/openbmc/u-boot/doc/ |
H A D | README.ae350 | 54 U-Boot 2018.01-rc2-00033-g824f89a (Dec 21 2017 - 16:51:26 +0800) 67 U-Boot 2018.01-rc2-00033-gb265b91-dirty (Dec 22 2017 - 13:54:21 +0800) 121 U-Boot 2018.01-rc2-00032-gf67dd47-dirty (Dec 21 2017 - 13:56:03 +0800)
|