lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 10 Aug 2018 15:03:28 +0300 From: Kalle Valo <kvalo@...eaurora.org> To: VIJAYAKUMAAR K T <vijay.bvb@...sung.com> Cc: "davem\@davemloft.net" <davem@...emloft.net>, "ath10k\@lists.infradead.org" <ath10k@...ts.infradead.org>, "linux-wireless\@vger.kernel.org" <linux-wireless@...r.kernel.org>, "netdev\@vger.kernel.org" <netdev@...r.kernel.org>, "linux-kernel\@vger.kernel.org" <linux-kernel@...r.kernel.org>, CPGS <cpgs@...sung.com> Subject: Re: [PATCH 1/1] ath10k: avoid possible memory access violation VIJAYAKUMAAR K T <vijay.bvb@...sung.com> writes: > It would be great, if this patch could be reviewed. It's in the queue and you can check the state from patchwork: https://wireless.wiki.kernel.org/en/developers/documentation/submittingpatches#checking_state_of_patches_from_patchwork -- Kalle Valo
Powered by blists - more mailing lists