1. 2013-09-29 [4] [PATCH 06/12] procfs: make /proc/*/stack 0400 kernel-harde Djalal Harouni 2. 2013-09-28 [7] [PATCH 04/12] seq_file: Make seq_file able to access the file's opener c kernel-harde Djalal Harouni 3. 2013-09-25 [1] [PATCH 12/12] user_ns: seq_file: use the user_ns that is embedded in the kernel-harde Djalal Harouni 4. 2013-09-25 [1] [PATCH 11/12] procfs: improve permission checks on /proc/*/syscall kernel-harde Djalal Harouni 5. 2013-09-25 [1] [PATCH 10/12] procfs: move PROC_BLOCK_SIZE declaration up to make it vis kernel-harde Djalal Harouni 6. 2013-09-25 [1] [PATCH 09/12] procfs: add permission checks on the file's opener of /pro kernel-harde Djalal Harouni 7. 2013-09-25 [1] [PATCH 08/12] procfs: add permission checks on the file's opener of /pro kernel-harde Djalal Harouni 8. 2013-09-25 [1] [PATCH 07/12] procfs: add permission checks on the file's opener of /pro kernel-harde Djalal Harouni 9. 2013-09-25 [1] [PATCH 05/12] seq_file: set the seq_file->f_cred during seq_open() kernel-harde Djalal Harouni 10. 2013-09-25 [1] [PATCH 03/12] procfs: Document the proposed solution to protect procfs e kernel-harde Djalal Harouni 11. 2013-09-25 [1] [PATCH 02/12] procfs: add proc_allow_access() to check if file's opener kernel-harde Djalal Harouni 12. 2013-09-25 [1] [PATCH 01/12] procfs: add proc_same_open_cred() to check if the cred hav kernel-harde Djalal Harouni 13. 2013-09-25 [1] [PATCH 0/12] procfs: protect /proc/<pid>/* files with file->f_cred kernel-harde Djalal Harouni 14. 2013-09-12 [3] Re: [PATCH 1/2] procfs: restore 0400 permissions on /proc/*/{syscall,sta kernel-harde Djalal Harouni