diff options
author | Guilherme Goncalves <guilherme.p.gonc@gmail.com> | 2021-12-24 11:22:11 -0300 |
---|---|---|
committer | Andreas Kling <kling@serenityos.org> | 2021-12-28 23:08:50 +0100 |
commit | 33b78915d377dfb950d93f150b8470aea2c1e66f (patch) | |
tree | 0be4e64332e2e7120720496f5db9dd1ffc6704b3 /Kernel/Graphics/VirtIOGPU | |
parent | 11599a334232d203c21a21662375ac952e3d7f0a (diff) | |
download | serenity-33b78915d377dfb950d93f150b8470aea2c1e66f.zip |
Kernel: Propagate overflow errors from Memory::page_round_up
Fixes #11402.
Diffstat (limited to 'Kernel/Graphics/VirtIOGPU')
-rw-r--r-- | Kernel/Graphics/VirtIOGPU/FramebufferDevice.h | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/Kernel/Graphics/VirtIOGPU/FramebufferDevice.h b/Kernel/Graphics/VirtIOGPU/FramebufferDevice.h index e8aa88683d..ed72e47af7 100644 --- a/Kernel/Graphics/VirtIOGPU/FramebufferDevice.h +++ b/Kernel/Graphics/VirtIOGPU/FramebufferDevice.h @@ -40,7 +40,7 @@ public: static size_t calculate_framebuffer_size(size_t width, size_t height) { // VirtIO resources can only map on page boundaries! - return Memory::page_round_up(sizeof(u32) * width * height); + return Memory::page_round_up(sizeof(u32) * width * height).value(); } u8* framebuffer_data(); |