diff options
author | Ilya Dryomov <idryomov@redhat.com> | 2014-12-19 14:00:41 +0300 |
---|---|---|
committer | Ilya Dryomov <idryomov@redhat.com> | 2015-01-08 20:36:57 +0300 |
commit | d7d5a007b1c64c617ce3ee30c973ed0bb93443d9 (patch) | |
tree | 86fb01a9fe2cf1b73e310057f0805d310a5fdb60 /net/ceph | |
parent | 0668ff52e2fbca869c579025612e9bcfc4edd40e (diff) | |
download | linux-d7d5a007b1c64c617ce3ee30c973ed0bb93443d9.tar.bz2 |
libceph: fix sparse endianness warnings
The only real issue is the one in auth_x.c and it came with
3.19-rc1 merge.
Signed-off-by: Ilya Dryomov <idryomov@redhat.com>
Diffstat (limited to 'net/ceph')
-rw-r--r-- | net/ceph/auth_x.c | 2 | ||||
-rw-r--r-- | net/ceph/mon_client.c | 2 |
2 files changed, 2 insertions, 2 deletions
diff --git a/net/ceph/auth_x.c b/net/ceph/auth_x.c index 15845814a0f2..ba6eb17226da 100644 --- a/net/ceph/auth_x.c +++ b/net/ceph/auth_x.c @@ -676,7 +676,7 @@ static int calcu_signature(struct ceph_x_authorizer *au, int ret; char tmp_enc[40]; __le32 tmp[5] = { - 16u, msg->hdr.crc, msg->footer.front_crc, + cpu_to_le32(16), msg->hdr.crc, msg->footer.front_crc, msg->footer.middle_crc, msg->footer.data_crc, }; ret = ceph_x_encrypt(&au->session_key, &tmp, sizeof(tmp), diff --git a/net/ceph/mon_client.c b/net/ceph/mon_client.c index a83062ceeec9..f2148e22b148 100644 --- a/net/ceph/mon_client.c +++ b/net/ceph/mon_client.c @@ -717,7 +717,7 @@ static int get_poolop_reply_buf(const char *src, size_t src_len, if (src_len != sizeof(u32) + dst_len) return -EINVAL; - buf_len = le32_to_cpu(*(u32 *)src); + buf_len = le32_to_cpu(*(__le32 *)src); if (buf_len != dst_len) return -EINVAL; |