brcmfmac: use kcalloc() to prevent integer overflow
The multiplication here looks like it could overflow. I've changed it to use kcalloc() to prevent that. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Acked-by: Arend van Spriel <arend@broadcom.com> Signed-off-by: John W. Linville <linville@tuxdriver.com>
This commit is contained in:
parent
365d2ebcab
commit
58901d181f
1 changed files with 2 additions and 2 deletions
|
@ -3297,8 +3297,8 @@ brcmf_notify_sched_scan_results(struct brcmf_cfg80211_priv *cfg_priv,
|
|||
int i;
|
||||
|
||||
request = kzalloc(sizeof(*request), GFP_KERNEL);
|
||||
ssid = kzalloc(sizeof(*ssid) * result_count, GFP_KERNEL);
|
||||
channel = kzalloc(sizeof(*channel) * result_count, GFP_KERNEL);
|
||||
ssid = kcalloc(result_count, sizeof(*ssid), GFP_KERNEL);
|
||||
channel = kcalloc(result_count, sizeof(*channel), GFP_KERNEL);
|
||||
if (!request || !ssid || !channel) {
|
||||
err = -ENOMEM;
|
||||
goto out_err;
|
||||
|
|
Loading…
Reference in a new issue