Replace kmalloc() with kmalloc_array() in several places to correctly
handle array allocations and benefit from built-in overflow checking.
This prevents potential integer overflows[1] when computing allocation
sizes from width, height, pitch, or page values.

[1]:https://docs.kernel.org/process/deprecated.html

Signed-off-by: Mehdi Ben Hadj Khelifa <[email protected]>
---
 drivers/gpu/drm/solomon/ssd130x.c | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/drivers/gpu/drm/solomon/ssd130x.c 
b/drivers/gpu/drm/solomon/ssd130x.c
index eec43d1a5595..0ce630861d34 100644
--- a/drivers/gpu/drm/solomon/ssd130x.c
+++ b/drivers/gpu/drm/solomon/ssd130x.c
@@ -1498,7 +1498,7 @@ static int ssd130x_crtc_atomic_check(struct drm_crtc 
*crtc,
        if (ret)
                return ret;
 
-       ssd130x_state->data_array = kmalloc(ssd130x->width * pages, GFP_KERNEL);
+       ssd130x_state->data_array = kmalloc_array(pages, ssd130x->width, 
GFP_KERNEL);
        if (!ssd130x_state->data_array)
                return -ENOMEM;
 
@@ -1519,7 +1519,7 @@ static int ssd132x_crtc_atomic_check(struct drm_crtc 
*crtc,
        if (ret)
                return ret;
 
-       ssd130x_state->data_array = kmalloc(columns * ssd130x->height, 
GFP_KERNEL);
+       ssd130x_state->data_array = kmalloc_array(ssd130x->height, columns, 
GFP_KERNEL);
        if (!ssd130x_state->data_array)
                return -ENOMEM;
 
@@ -1546,7 +1546,7 @@ static int ssd133x_crtc_atomic_check(struct drm_crtc 
*crtc,
 
        pitch = drm_format_info_min_pitch(fi, 0, ssd130x->width);
 
-       ssd130x_state->data_array = kmalloc(pitch * ssd130x->height, 
GFP_KERNEL);
+       ssd130x_state->data_array = kmalloc_array(ssd130x->height, pitch, 
GFP_KERNEL);
        if (!ssd130x_state->data_array)
                return -ENOMEM;
 
-- 
2.51.1.dirty

Reply via email to