The patch titled selinux: fix dentry_open() error check has been added to the -mm tree. Its filename is selinux-fix-dentry_open-error-check.patch See http://www.zip.com.au/~akpm/linux/patches/stuff/added-to-mm.txt to find out what to do about this ------------------------------------------------------ Subject: selinux: fix dentry_open() error check From: Akinobu Mita <akinobu.mita@xxxxxxxxx> The return value of dentry_open() shoud be checked by IS_ERR(). Cc: Stephen Smalley <sds@xxxxxxxxxxxxx> Cc: James Morris <jmorris@xxxxxxxxx> Signed-off-by: Akinobu Mita <akinobu.mita@xxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxx> --- security/selinux/hooks.c | 3 ++- 1 files changed, 2 insertions(+), 1 deletion(-) diff -puN security/selinux/hooks.c~selinux-fix-dentry_open-error-check security/selinux/hooks.c --- a/security/selinux/hooks.c~selinux-fix-dentry_open-error-check +++ a/security/selinux/hooks.c @@ -1760,7 +1760,8 @@ static inline void flush_unauthorized_fi get_file(devnull); } else { devnull = dentry_open(dget(selinux_null), mntget(selinuxfs_mount), O_RDWR); - if (!devnull) { + if (IS_ERR(devnull)) { + devnull = NULL; put_unused_fd(fd); fput(file); continue; _ Patches currently in -mm which might be from akinobu.mita@xxxxxxxxx are origin.patch fix-create_write_pipe-error-check.patch ecryptfs-fix-crypto_alloc_blkcipher-error-check.patch acpi-fix-single-linked-list-manipulation.patch acpi-processor-prevent-loading-module-on-failures.patch git-alsa.patch audit-fix-kstrdup-error-check.patch drm-fix-return-value-check.patch git-input.patch input-check-whether-serio-dirver-registration-is-completed.patch ata-fix-platform_device_register_simple-error-check.patch git-mtd.patch gss_spkm3-fix-error-handling-in-module-init.patch auth_gss-unregister-gss_domain-when-unloading-module.patch auth_gss-unregister-gss_domain-when-unloading-module-fix.patch git-pcmcia.patch iscsi-fix-crypto_alloc_hash-error-check.patch git-watchdog.patch selinux-fix-dentry_open-error-check.patch paride-return-proper-error-code.patch futex-init-error-check.patch spi-check-platform_device_register_simple-error.patch synclink_gt-fix-init-error-handling.patch bit-revese-library.patch crc32-replace-bitreverse-by-bitrev32.patch video-use-bitrev8.patch net-use-bitrev8.patch net-use-bitrev8-tidy.patch isdn-hisax-use-bitrev8.patch atm-ambassador-use-bitrev8.patch isdn-gigaset-use-bitrev8.patch isdn-fix-missing-unregister_capi_driver.patch fault-injection-documentation-and-scripts.patch fault-injection-capabilities-infrastructure.patch fault-injection-capabilities-infrastructure-tidy.patch fault-injection-capabilities-infrastructure-tweaks.patch fault-injection-capability-for-kmalloc.patch fault-injection-capability-for-kmalloc-failslab-remove-__gfp_highmem-filtering.patch fault-injection-capability-for-alloc_pages.patch fault-injection-capability-for-disk-io.patch fault-injection-process-filtering-for-fault-injection-capabilities.patch fault-injection-stacktrace-filtering.patch fault-injection-stacktrace-filtering-reject-failure-if-any-caller-lies-within-specified-range.patch fault-injection-Kconfig-cleanup.patch fault-injection-stacktrace-filtering-kconfig-fix.patch fault-injection-Kconfig-cleanup-config_fault_injection-help-text.patch - To unsubscribe from this list: send the line "unsubscribe mm-commits" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html