Hi Tom,

On Mon, May 11, 2015 at 5:41 PM, Simon Glass <s...@chromium.org> wrote:
> On 11 May 2015 at 12:53, Joe Hershberger <joe.hershber...@ni.com> wrote:
>> The setexpr command used to segfault when accessing memory in sandbox.
>> The pointer accesses should be mapped.
>>
>> Signed-off-by: Joe Hershberger <joe.hershber...@ni.com>
>> Cc: Simon Glass <s...@chromium.org>
>> ---
>>
>>  common/cmd_setexpr.c | 32 +++++++++++++++++++++++---------
>>  1 file changed, 23 insertions(+), 9 deletions(-)
>
> Reviewed-by: Simon Glass <s...@chromium.org>

Can you pull this patch in?

I have to regenerate patch 1 in this series, but this is pretty much
independent. These should not have been in the same series.

Thanks,
-Joe
_______________________________________________
U-Boot mailing list
U-Boot@lists.denx.de
http://lists.denx.de/mailman/listinfo/u-boot

Reply via email to