The patch titled procfs: return ENOENT on opening a being-removed proc entry has been added to the -mm tree. Its filename is procfs-return-enoent-on-opening-a-being-removed-proc-entry.patch Before you just go and hit "reply", please: a) Consider who else should be cc'ed b) Prefer to cc a suitable mailing list as well c) Ideally: find the original patch on the mailing list and do a reply-to-all to that, adding suitable additional cc's *** Remember to use Documentation/SubmitChecklist when testing your code *** See http://userweb.kernel.org/~akpm/stuff/added-to-mm.txt to find out what to do about this The current -mm tree may be found at http://userweb.kernel.org/~akpm/mmotm/ ------------------------------------------------------ Subject: procfs: return ENOENT on opening a being-removed proc entry From: Daisuke Ogino <ogino.daisuke@xxxxxxxxxxxxxx> Change the return value to ENOENT. This return value is then returned when opening the proc entry that have been removed. For example, open("/proc/bus/pci/XX/YY") when the corresponding device is being hot-removed. Signed-off-by: Daisuke Ogino <ogino.daisuke@xxxxxxxxxxxxxx> Cc: Jesse Barnes <jbarnes@xxxxxxxxxxxxxxxx> Cc: Alexey Dobriyan <adobriyan@xxxxxxxxx> Cc: Christoph Hellwig <hch@xxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- fs/proc/inode.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff -puN fs/proc/inode.c~procfs-return-enoent-on-opening-a-being-removed-proc-entry fs/proc/inode.c --- a/fs/proc/inode.c~procfs-return-enoent-on-opening-a-being-removed-proc-entry +++ a/fs/proc/inode.c @@ -321,7 +321,7 @@ static int proc_reg_open(struct inode *i if (!pde->proc_fops) { spin_unlock(&pde->pde_unload_lock); kfree(pdeo); - return -EINVAL; + return -ENOENT; } pde->pde_users++; open = pde->proc_fops->open; _ Patches currently in -mm which might be from ogino.daisuke@xxxxxxxxxxxxxx are procfs-return-enoent-on-opening-a-being-removed-proc-entry.patch -- To unsubscribe from this list: send the line "unsubscribe mm-commits" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html