The patch titled mm/vmalloc.c: check kmalloc() return value has been added to the -mm tree. Its filename is mm-vmallocc-check-kmalloc-return-value.patch Before you just go and hit "reply", please: a) Consider who else should be cc'ed b) Prefer to cc a suitable mailing list as well c) Ideally: find the original patch on the mailing list and do a reply-to-all to that, adding suitable additional cc's *** Remember to use Documentation/SubmitChecklist when testing your code *** See http://userweb.kernel.org/~akpm/stuff/added-to-mm.txt to find out what to do about this The current -mm tree may be found at http://userweb.kernel.org/~akpm/mmotm/ ------------------------------------------------------ Subject: mm/vmalloc.c: check kmalloc() return value From: Kulikov Vasiliy <segooon@xxxxxxxxx> kmalloc() may fail, if so return -ENOMEM. Signed-off-by: Kulikov Vasiliy <segooon@xxxxxxxxx> Acked-by: Pekka Enberg <penberg@xxxxxxxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- mm/vmalloc.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff -puN mm/vmalloc.c~mm-vmallocc-check-kmalloc-return-value mm/vmalloc.c --- a/mm/vmalloc.c~mm-vmallocc-check-kmalloc-return-value +++ a/mm/vmalloc.c @@ -2494,8 +2494,11 @@ static int vmalloc_open(struct inode *in unsigned int *ptr = NULL; int ret; - if (NUMA_BUILD) + if (NUMA_BUILD) { ptr = kmalloc(nr_node_ids * sizeof(unsigned int), GFP_KERNEL); + if (ptr == NULL) + return -ENOMEM; + } ret = seq_open(file, &vmalloc_op); if (!ret) { struct seq_file *m = file->private_data; _ Patches currently in -mm which might be from segooon@xxxxxxxxx are linux-next.patch mm-vmallocc-check-kmalloc-return-value.patch i2o-fix-overflow-of-copy_to_user.patch i2o-check-return-code-from-put_user.patch edac-i5000-improve-handling-of-pci_enable_device-return-value.patch edac-i5400-improve-handling-of-pci_enable_device-return-value.patch -- To unsubscribe from this list: send the line "unsubscribe mm-commits" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html