forked from Minki/linux
libceph: fix sparse endianness warnings
The only real issue is the one in auth_x.c and it came with 3.19-rc1 merge. Signed-off-by: Ilya Dryomov <idryomov@redhat.com>
This commit is contained in:
parent
0668ff52e2
commit
d7d5a007b1
@ -87,8 +87,8 @@ struct ceph_osd_req_op {
|
||||
struct ceph_osd_data osd_data;
|
||||
} extent;
|
||||
struct {
|
||||
__le32 name_len;
|
||||
__le32 value_len;
|
||||
u32 name_len;
|
||||
u32 value_len;
|
||||
__u8 cmp_op; /* CEPH_OSD_CMPXATTR_OP_* */
|
||||
__u8 cmp_mode; /* CEPH_OSD_CMPXATTR_MODE_* */
|
||||
struct ceph_osd_data osd_data;
|
||||
|
@ -676,7 +676,7 @@ static int calcu_signature(struct ceph_x_authorizer *au,
|
||||
int ret;
|
||||
char tmp_enc[40];
|
||||
__le32 tmp[5] = {
|
||||
16u, msg->hdr.crc, msg->footer.front_crc,
|
||||
cpu_to_le32(16), msg->hdr.crc, msg->footer.front_crc,
|
||||
msg->footer.middle_crc, msg->footer.data_crc,
|
||||
};
|
||||
ret = ceph_x_encrypt(&au->session_key, &tmp, sizeof(tmp),
|
||||
|
@ -717,7 +717,7 @@ static int get_poolop_reply_buf(const char *src, size_t src_len,
|
||||
if (src_len != sizeof(u32) + dst_len)
|
||||
return -EINVAL;
|
||||
|
||||
buf_len = le32_to_cpu(*(u32 *)src);
|
||||
buf_len = le32_to_cpu(*(__le32 *)src);
|
||||
if (buf_len != dst_len)
|
||||
return -EINVAL;
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user