From mboxrd@z Thu Jan 1 00:00:00 1970 Return-path: Received: from smtp.codeaurora.org ([198.145.29.96]) by bombadil.infradead.org with esmtps (Exim 4.90_1 #2 (Red Hat Linux)) id 1fo68u-0005hg-KT for ath10k@lists.infradead.org; Fri, 10 Aug 2018 12:03:46 +0000 From: Kalle Valo Subject: Re: [PATCH 1/1] ath10k: avoid possible memory access violation References: <1533292805-9709-1-git-send-email-vijay.bvb@samsung.com> <20180810101916epcms5p1e3d60d9cbc49f9a7c9529d87d691f359@epcms5p1> Date: Fri, 10 Aug 2018 15:03:28 +0300 In-Reply-To: <20180810101916epcms5p1e3d60d9cbc49f9a7c9529d87d691f359@epcms5p1> (VIJAYAKUMAAR K. T.'s message of "Fri, 10 Aug 2018 15:49:16 +0530") Message-ID: <87eff6zawf.fsf@kamboji.qca.qualcomm.com> MIME-Version: 1.0 List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "ath10k" Errors-To: ath10k-bounces+kvalo=adurom.com@lists.infradead.org To: VIJAYAKUMAAR K T Cc: "netdev@vger.kernel.org" , "linux-wireless@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "ath10k@lists.infradead.org" , CPGS , "davem@davemloft.net" VIJAYAKUMAAR K T writes: > It would be great, if this patch could be reviewed. It's in the queue and you can check the state from patchwork: https://wireless.wiki.kernel.org/en/developers/documentation/submittingpatches#checking_state_of_patches_from_patchwork -- Kalle Valo _______________________________________________ ath10k mailing list ath10k@lists.infradead.org http://lists.infradead.org/mailman/listinfo/ath10k From mboxrd@z Thu Jan 1 00:00:00 1970 Return-path: Received: from smtp.codeaurora.org ([198.145.29.96]:42860 "EHLO smtp.codeaurora.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727494AbeHJOdM (ORCPT ); Fri, 10 Aug 2018 10:33:12 -0400 From: Kalle Valo To: VIJAYAKUMAAR K T Cc: "davem\@davemloft.net" , "ath10k\@lists.infradead.org" , "linux-wireless\@vger.kernel.org" , "netdev\@vger.kernel.org" , "linux-kernel\@vger.kernel.org" , CPGS Subject: Re: [PATCH 1/1] ath10k: avoid possible memory access violation References: <1533292805-9709-1-git-send-email-vijay.bvb@samsung.com> <20180810101916epcms5p1e3d60d9cbc49f9a7c9529d87d691f359@epcms5p1> Date: Fri, 10 Aug 2018 15:03:28 +0300 In-Reply-To: <20180810101916epcms5p1e3d60d9cbc49f9a7c9529d87d691f359@epcms5p1> (VIJAYAKUMAAR K. T.'s message of "Fri, 10 Aug 2018 15:49:16 +0530") Message-ID: <87eff6zawf.fsf@kamboji.qca.qualcomm.com> (sfid-20180810_140352_412582_41F2479E) MIME-Version: 1.0 Content-Type: text/plain Sender: linux-wireless-owner@vger.kernel.org List-ID: VIJAYAKUMAAR K T writes: > It would be great, if this patch could be reviewed. It's in the queue and you can check the state from patchwork: https://wireless.wiki.kernel.org/en/developers/documentation/submittingpatches#checking_state_of_patches_from_patchwork -- Kalle Valo