Return-path: Received: from wolverine02.qualcomm.com ([199.106.114.251]:4265 "EHLO wolverine02.qualcomm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751836AbcGHGsr (ORCPT ); Fri, 8 Jul 2016 02:48:47 -0400 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Subject: Re: [v2,3/5] ath10k: Add WARN_ON if we over-write peer-map pointer. From: Kalle Valo In-Reply-To: <1459545132-11295-3-git-send-email-greearb@candelatech.com> To: Ben Greear CC: , Ben Greear , Message-ID: (sfid-20160708_084850_640986_862F8752) Date: Fri, 8 Jul 2016 08:48:40 +0200 Sender: linux-wireless-owner@vger.kernel.org List-ID: Ben Greear wrote: > From: Ben Greear > > Not sure this can happen, but seems like a reasonable sanity > check. > > Signed-off-by: Ben Greear Thanks, 2 patches applied to ath-next branch of ath.git: c5ace87a886d ath10k: Add WARN_ON if we over-write peer-map pointer. d0eeafad1189 ath10k: Clean up peer when sta goes away. -- Sent by pwcli https://patchwork.kernel.org/patch/8727861/