* task_work_cancel_match - cancel a pending work added by task_work_add()
--- a/security/security.c
+++ b/security/security.c
-@@ -752,24 +752,28 @@ int security_binder_set_context_mgr(cons
+@@ -798,6 +798,7 @@ int security_binder_set_context_mgr(cons
{
return call_int_hook(binder_set_context_mgr, 0, mgr);
}
+EXPORT_SYMBOL_GPL(security_binder_set_context_mgr);
- int security_binder_transaction(const struct cred *from,
- const struct cred *to)
+ /**
+ * security_binder_transaction() - Check if a binder transaction is allowed
+@@ -813,6 +814,7 @@ int security_binder_transaction(const st
{
return call_int_hook(binder_transaction, 0, from, to);
}
+EXPORT_SYMBOL_GPL(security_binder_transaction);
- int security_binder_transfer_binder(const struct cred *from,
- const struct cred *to)
+ /**
+ * security_binder_transfer_binder() - Check if a binder transfer is allowed
+@@ -828,6 +830,7 @@ int security_binder_transfer_binder(cons
{
return call_int_hook(binder_transfer_binder, 0, from, to);
}
+EXPORT_SYMBOL_GPL(security_binder_transfer_binder);
- int security_binder_transfer_file(const struct cred *from,
- const struct cred *to, struct file *file)
+ /**
+ * security_binder_transfer_file() - Check if a binder file xfer is allowed
+@@ -844,6 +847,7 @@ int security_binder_transfer_file(const
{
return call_int_hook(binder_transfer_file, 0, from, to, file);
}
+EXPORT_SYMBOL_GPL(security_binder_transfer_file);
- int security_ptrace_access_check(struct task_struct *child, unsigned int mode)
- {
+ /**
+ * security_ptrace_access_check() - Check if tracing is allowed
--- a/ipc/namespace.c~ 2022-12-11 23:15:18.000000000 +0100
+++ b/ipc/namespace.c 2022-12-29 16:10:27.771070995 +0100
@@ -188,6 +188,7 @@