On Sun, 3 Apr 2022 at 04:39, Andrew Scull <asc...@google.com> wrote:
>
> This tests calls regmap_read() which takes a uint pointer as an output
> parameter. The test was passing a pointer to a u16 which resulted in an
> overflow when the output was written. Fix this by following the
> regmap_read() API and passing a uint pointer instead.
>
> Signed-off-by: Andrew Scull <asc...@google.com>
> Cc: Simon Glass <s...@chromium.org>
> Cc: Heinrich Schuchardt <xypron.g...@gmx.de>
> Cc: Jean-Jacques Hiblot <jjhib...@ti.com>
> Cc: Pratyush Yadav <p.ya...@ti.com>
> ---
>  test/dm/regmap.c | 9 ++++-----
>  1 file changed, 4 insertions(+), 5 deletions(-)

Reviewed-by: Simon Glass <s...@chromium.org>

Reply via email to