Re: [PATCH] spi/xilinx: Fix access invalid memory on xilinx_spi_tx

From: Ricardo Ribalda Delgado
Date: Fri Jan 30 2015 - 07:23:09 EST


On 30 Jan 2015 11:06, "Geert Uytterhoeven" <geert@xxxxxxxxxxxxxx> wrote:

> Is this endian-safe?

As endianness safe as the original code, but there is also an issue. It is
using rx_ptr.

I am away until Sunday. So I cannot make a new patch until then. I tried
to make this patch before leaving in the morning and was obviously a
mistake.

Again, Sorry for the mess this is really embarrassing.
Regards
> xspi->tx_ptr += xspi->bytes_per_word;

> > }
>
> Gr{oetje,eeting}s,
>
> Geert
>
> --
> Geert Uytterhoeven -- There's lots of Linux beyond ia32 --
> geert@xxxxxxxxxxxxxx <javascript:;>
>
> In personal conversations with technical people, I call myself a hacker.
> But
> when I'm talking to journalists I just say "programmer" or something like
> that.
> -- Linus Torvalds
>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/