From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id 86450A04A2 for ; Tue, 12 May 2020 08:29:02 +0200 (CEST) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 79EEB1C193; Tue, 12 May 2020 08:29:02 +0200 (CEST) Received: by dpdk.org (Postfix, from userid 1017) id 51BA81C193; Tue, 12 May 2020 08:29:01 +0200 (CEST) In-Reply-To: <20200512151915.105152-1-wei.zhao1@intel.com> References: <20200512151915.105152-1-wei.zhao1@intel.com> To: test-report@dpdk.org Message-Id: <20200512062901.51BA81C193@dpdk.org> Date: Tue, 12 May 2020 08:29:01 +0200 (CEST) From: checkpatch@dpdk.org Subject: [dpdk-test-report] |SUCCESS| pw70095 [PATCH] net/i40e: fix the security risk of wild pointer operation X-BeenThere: test-report@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: automatic DPDK test reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: test-report-bounces@dpdk.org Sender: "test-report" Test-Label: checkpatch Test-Status: SUCCESS http://dpdk.org/patch/70095 _coding style OK_