From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 66AE2A04FD for ; Sun, 3 Jul 2022 14:23:13 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 62F3541132; Sun, 3 Jul 2022 14:23:13 +0200 (CEST) Received: from dpdk.org (dpdk.org [92.243.24.197]) by mails.dpdk.org (Postfix) with ESMTP id 5F91841133 for ; Sun, 3 Jul 2022 14:23:12 +0200 (CEST) Received: by dpdk.org (Postfix, from userid 65534) id 5AFB9120787; Sun, 3 Jul 2022 14:23:12 +0200 (CEST) Subject: |SUCCESS| pw113654 [PATCH v2 2/3] dma/idxd: fix memory leak due to free on incorrect pointer In-Reply-To: <20220703122243.929642-3-kevin.laatz@intel.com> References: <20220703122243.929642-3-kevin.laatz@intel.com> To: test-report@dpdk.org From: checkpatch@dpdk.org Message-Id: <20220703122312.5AFB9120787@dpdk.org> Date: Sun, 3 Jul 2022 14:23:12 +0200 (CEST) X-BeenThere: test-report@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: automatic DPDK test reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: test-report-bounces@dpdk.org Test-Label: checkpatch Test-Status: SUCCESS http://dpdk.org/patch/113654 _coding style OK_