
29 Apr
2022
29 Apr
'22
8:03 p.m.
On Sun, Apr 03, 2022 at 10:39:14AM +0000, Andrew Scull wrote:
This tests calls regmap_read() which takes a uint pointer as an output parameter. The test was passing a pointer to a u16 which resulted in an overflow when the output was written. Fix this by following the regmap_read() API and passing a uint pointer instead.
Signed-off-by: Andrew Scull ascull@google.com Cc: Simon Glass sjg@chromium.org Cc: Heinrich Schuchardt xypron.glpk@gmx.de Cc: Jean-Jacques Hiblot jjhiblot@ti.com Cc: Pratyush Yadav p.yadav@ti.com Reviewed-by: Simon Glass sjg@chromium.org
Applied to u-boot/master, thanks!
--
Tom