diff options
author | Stephen Kitt <steve@sk2.org> | 2019-10-19 17:06:34 +0300 |
---|---|---|
committer | Stephen Boyd <sboyd@kernel.org> | 2019-11-08 20:00:37 +0300 |
commit | 7f6ac72946b88b89ee44c1c527aa8591ac5ffcbe (patch) | |
tree | 2e925a8f238ba1aa2b7d4b9e197011430389f98b | |
parent | 049325870aa86a6c6b17ce3db667a6adbb6e6a76 (diff) | |
download | linux-7f6ac72946b88b89ee44c1c527aa8591ac5ffcbe.tar.xz |
clk/ti/adpll: allocate room for terminating null
The buffer allocated in ti_adpll_clk_get_name doesn't account for the
terminating null. This patch switches to devm_kasprintf to avoid
overflowing.
Signed-off-by: Stephen Kitt <steve@sk2.org>
Link: https://lkml.kernel.org/r/20191019140634.15596-1-steve@sk2.org
Acked-by: Tony Lindgren <tony@atomide.com>
Signed-off-by: Stephen Boyd <sboyd@kernel.org>
-rw-r--r-- | drivers/clk/ti/adpll.c | 11 |
1 files changed, 2 insertions, 9 deletions
diff --git a/drivers/clk/ti/adpll.c b/drivers/clk/ti/adpll.c index fdfb90058504..bb2f2836dab2 100644 --- a/drivers/clk/ti/adpll.c +++ b/drivers/clk/ti/adpll.c @@ -194,15 +194,8 @@ static const char *ti_adpll_clk_get_name(struct ti_adpll_data *d, if (err) return NULL; } else { - const char *base_name = "adpll"; - char *buf; - - buf = devm_kzalloc(d->dev, 8 + 1 + strlen(base_name) + 1 + - strlen(postfix), GFP_KERNEL); - if (!buf) - return NULL; - sprintf(buf, "%08lx.%s.%s", d->pa, base_name, postfix); - name = buf; + name = devm_kasprintf(d->dev, GFP_KERNEL, "%08lx.adpll.%s", + d->pa, postfix); } return name; |