diff options
author | Thierry Escande <thierry.escande@linux.intel.com> | 2013-09-24 11:47:34 +0200 |
---|---|---|
committer | Samuel Ortiz <sameo@linux.intel.com> | 2013-09-25 02:02:42 +0200 |
commit | 13292c9a1ed92e535caae6154db1fea7993777ad (patch) | |
tree | d6dc69f283c270da3e743a2ba0f1da74d9c694ba /security | |
parent | NFC: rawsock: Fix a memory leak (diff) | |
download | linux-13292c9a1ed92e535caae6154db1fea7993777ad.tar.xz linux-13292c9a1ed92e535caae6154db1fea7993777ad.zip |
NFC: digital: Fix sens_res endiannes handling
This was triggered by the following sparse warning:
net/nfc/digital_technology.c:272:20: sparse: cast to restricted __be16
The SENS_RES response must be treated as __le16 with the first byte
received as LSB and the second one as MSB. This is the way neard
handles it in the sens_res field of the nfc_target structure which is
treated as u16 in cpu endianness. So le16_to_cpu() is used on the
received SENS_RES instead of memcpy'ing it.
SENS_RES test macros have also been fixed accordingly.
Signed-off-by: Thierry Escande <thierry.escande@linux.intel.com>
Signed-off-by: Samuel Ortiz <sameo@linux.intel.com>
Diffstat (limited to 'security')
0 files changed, 0 insertions, 0 deletions