Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753518AbWKCUCJ (ORCPT ); Fri, 3 Nov 2006 15:02:09 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1753521AbWKCUCJ (ORCPT ); Fri, 3 Nov 2006 15:02:09 -0500 Received: from e36.co.us.ibm.com ([32.97.110.154]:50609 "EHLO e36.co.us.ibm.com") by vger.kernel.org with ESMTP id S1753518AbWKCUCG (ORCPT ); Fri, 3 Nov 2006 15:02:06 -0500 Date: Fri, 3 Nov 2006 14:02:03 -0600 From: Michael Halcrow To: Florin Malita Cc: phillip@hellewell.homeip.net, linux-kernel@vger.kernel.org, Andrew Morton Subject: Re: [PATCH] ecryptfs: bad allocation result check Message-ID: <20061103200203.GA3572@us.ibm.com> Reply-To: Michael Halcrow References: <454B9DBA.8030705@gmail.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <454B9DBA.8030705@gmail.com> User-Agent: Mutt/1.5.9i Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 549 Lines: 11 On Fri, Nov 03, 2006 at 02:51:22PM -0500, Florin Malita wrote: > The kmalloc() result in* *ecryptfs_crypto_api_algify_cipher_name() > is assigned to an indirectly referenced pointer and not to the > pointer itself, so the current result check is incorrect. Thanks; this bug was already caught and fixed. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/