The quilt patch titled Subject: alloc_tag: Tighten file permissions on /proc/allocinfo has been removed from the -mm tree. Its filename was alloc_tag-tighten-file-permissions-on-proc-allocinfo.patch This patch was dropped because it was merged into the mm-stable branch of git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm ------------------------------------------------------ From: Kees Cook <keescook@xxxxxxxxxxxx> Subject: alloc_tag: Tighten file permissions on /proc/allocinfo Date: Thu, 25 Apr 2024 13:08:50 -0700 The /proc/allocinfo file exposes a tremendous about of information about kernel build details, memory allocations (obviously), and potentially even image layout (due to ordering). As this is intended to be consumed by system owners (like /proc/slabinfo), use the same file permissions as there: 0400. Link: https://lkml.kernel.org/r/20240425200844.work.184-kees@xxxxxxxxxx Signed-off-by: Kees Cook <keescook@xxxxxxxxxxxx> Cc: Kent Overstreet <kent.overstreet@xxxxxxxxx> Cc: Suren Baghdasaryan <surenb@xxxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- lib/alloc_tag.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/lib/alloc_tag.c~alloc_tag-tighten-file-permissions-on-proc-allocinfo +++ a/lib/alloc_tag.c @@ -129,7 +129,7 @@ size_t alloc_tag_top_users(struct codeta static void __init procfs_init(void) { - proc_create_seq("allocinfo", 0444, NULL, &allocinfo_seq_op); + proc_create_seq("allocinfo", 0400, NULL, &allocinfo_seq_op); } static bool alloc_tag_module_unload(struct codetag_type *cttype, _ Patches currently in -mm which might be from keescook@xxxxxxxxxxxx are