From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id D3AE545748 for ; Tue, 6 Aug 2024 10:43:30 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id D055640E4F; Tue, 6 Aug 2024 10:43:30 +0200 (CEST) Received: from dpdk.org (dpdk.org [92.243.24.197]) by mails.dpdk.org (Postfix) with ESMTP id 61B1F406B7 for ; Tue, 6 Aug 2024 10:43:28 +0200 (CEST) Received: by dpdk.org (Postfix, from userid 65534) id 5CA07123EF2; Tue, 6 Aug 2024 10:43:28 +0200 (CEST) Subject: |SUCCESS| pw142917 [v1 1/7] crypto/dpaa2_sec: fix memory leak In-Reply-To: <20240806084136.3212615-2-g.singh@nxp.com> References: <20240806084136.3212615-2-g.singh@nxp.com> To: test-report@dpdk.org From: checkpatch@dpdk.org Message-Id: <20240806084328.5CA07123EF2@dpdk.org> Date: Tue, 6 Aug 2024 10:43:28 +0200 (CEST) X-BeenThere: test-report@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: automatic DPDK test reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: test-report-bounces@dpdk.org Test-Label: checkpatch Test-Status: SUCCESS http://dpdk.org/patch/142917 _coding style OK_