gcc: Tweak Upstream-Status formatting

Message ID 20211119110539.4095135-1-richard.purdie@linuxfoundation.org
State Accepted, archived
Commit f05cdcb428634086c12c1a087196bd16678eda80
Headers show
Series gcc: Tweak Upstream-Status formatting | expand

Commit Message

Richard Purdie Nov. 19, 2021, 11:05 a.m. UTC
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
---
 meta/recipes-devtools/gcc/gcc/0001-CVE-2021-35465.patch | 2 +-
 meta/recipes-devtools/gcc/gcc/0002-CVE-2021-35465.patch | 2 +-
 meta/recipes-devtools/gcc/gcc/0003-CVE-2021-35465.patch | 2 +-
 meta/recipes-devtools/gcc/gcc/0004-CVE-2021-35465.patch | 2 +-
 4 files changed, 4 insertions(+), 4 deletions(-)

Patch

diff --git a/meta/recipes-devtools/gcc/gcc/0001-CVE-2021-35465.patch b/meta/recipes-devtools/gcc/gcc/0001-CVE-2021-35465.patch
index 6b1d4e3fce4..e4aee10e370 100644
--- a/meta/recipes-devtools/gcc/gcc/0001-CVE-2021-35465.patch
+++ b/meta/recipes-devtools/gcc/gcc/0001-CVE-2021-35465.patch
@@ -20,7 +20,7 @@  gcc:
 	the command line.
 
 CVE: CVE-2021-35465
-Upstream-Status: Backport[https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=3929bca9ca95de9d35e82ae8828b188029e3eb70]
+Upstream-Status: Backport [https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=3929bca9ca95de9d35e82ae8828b188029e3eb70]
 Signed-off-by: Pgowda <pgowda.cve@gmail.com>
 
 ---
diff --git a/meta/recipes-devtools/gcc/gcc/0002-CVE-2021-35465.patch b/meta/recipes-devtools/gcc/gcc/0002-CVE-2021-35465.patch
index 98841e6d7c1..e09818fecf7 100644
--- a/meta/recipes-devtools/gcc/gcc/0002-CVE-2021-35465.patch
+++ b/meta/recipes-devtools/gcc/gcc/0002-CVE-2021-35465.patch
@@ -15,7 +15,7 @@  libgcc:
 	Add vlldm erratum work-around.
 
 CVE: CVE-2021-35465
-Upstream-Status: Backport[https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=574e7950bd6b34e9e2cacce18c802b45505d1d0a]
+Upstream-Status: Backport [https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=574e7950bd6b34e9e2cacce18c802b45505d1d0a]
 Signed-off-by: Pgowda <pgowda.cve@gmail.com>
 
 ---
diff --git a/meta/recipes-devtools/gcc/gcc/0003-CVE-2021-35465.patch b/meta/recipes-devtools/gcc/gcc/0003-CVE-2021-35465.patch
index d87be198669..c7a7c76bf87 100644
--- a/meta/recipes-devtools/gcc/gcc/0003-CVE-2021-35465.patch
+++ b/meta/recipes-devtools/gcc/gcc/0003-CVE-2021-35465.patch
@@ -16,7 +16,7 @@  gcc:
 	use when erratum mitigation is needed.
 
 CVE: CVE-2021-35465
-Upstream-Status: Backport[https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=30461cf8dba3d3adb15a125e4da48800eb2b9b8f]
+Upstream-Status: Backport [https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=30461cf8dba3d3adb15a125e4da48800eb2b9b8f]
 Signed-off-by: Pgowda <pgowda.cve@gmail.com>
 
 ---
diff --git a/meta/recipes-devtools/gcc/gcc/0004-CVE-2021-35465.patch b/meta/recipes-devtools/gcc/gcc/0004-CVE-2021-35465.patch
index 12dfe682fa7..9dd6a313c2d 100644
--- a/meta/recipes-devtools/gcc/gcc/0004-CVE-2021-35465.patch
+++ b/meta/recipes-devtools/gcc/gcc/0004-CVE-2021-35465.patch
@@ -17,7 +17,7 @@  gcc/testsuite:
 	* gcc.target/arm/cmse/mainline/8_1m/softfp/cmse-8a.c: Likewise.
 
 CVE: CVE-2021-35465
-Upstream-Status: Backport[https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=809330ab8450261e05919b472783bf15e4b000f7]
+Upstream-Status: Backport [https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=809330ab8450261e05919b472783bf15e4b000f7]
 Signed-off-by: Pgowda <pgowda.cve@gmail.com>
 
 ---