[prev in list] [next in list] [prev in thread] [next in thread]
List: linux-spi
Subject: Re: [PATCH] spi/xilinx: Fix access invalid memory on xilinx_spi_tx
From: Ricardo Ribalda Delgado <ricardo.ribalda () gmail ! com>
Date: 2015-01-30 12:23:01
Message-ID: CAPybu_3W3pSBLCxnVKyPVgnFQkitYMGu=xYbX+PpeTZcQH1oXA () mail ! gmail ! com
[Download RAW message or body]
On 30 Jan 2015 11:06, "Geert Uytterhoeven" <geert@linux-m68k.org> wrote:
> Is this endian-safe?
As endianness safe as the original code, but there is also an issue. It is
using rx_ptr.
I am away until Sunday. So I cannot make a new patch until then. I tried
to make this patch before leaving in the morning and was obviously a
mistake.
Again, Sorry for the mess this is really embarrassing.
Regards
> xspi->tx_ptr += xspi->bytes_per_word;
> > }
>
> Gr{oetje,eeting}s,
>
> Geert
>
> --
> Geert Uytterhoeven -- There's lots of Linux beyond ia32 --
> geert@linux-m68k.org <javascript:;>
>
> In personal conversations with technical people, I call myself a hacker.
> But
> when I'm talking to journalists I just say "programmer" or something like
> that.
> -- Linus Torvalds
>
--
To unsubscribe from this list: send the line "unsubscribe linux-spi" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic