]> git.pld-linux.org Git - packages/kernel.git/blobdiff - android-enable-building-binder-as-module.patch
- drop vserver, project is dead for years, last patch was for kernel 4.9 (EOL)
[packages/kernel.git] / android-enable-building-binder-as-module.patch
index c6006b250bf5872861c5c2758626670e458a3f41..5bbd029e0fb86266fd8dcc1b2a4ec94ab23bd044 100644 (file)
  
  /**
   * task_work_cancel_match - cancel a pending work added by task_work_add()
---- a/mm/memory.c
-+++ b/mm/memory.c
-@@ -1757,6 +1757,7 @@ void zap_page_range(struct vm_area_struc
-       mmu_notifier_invalidate_range_end(&range);
-       tlb_finish_mmu(&tlb);
- }
-+EXPORT_SYMBOL_GPL(zap_page_range);
- /**
-  * zap_page_range_single - remove user pages in a given range
 --- a/security/security.c
 +++ b/security/security.c
-@@ -752,24 +752,28 @@ int security_binder_set_context_mgr(cons
+@@ -798,6 +798,7 @@ int security_binder_set_context_mgr(cons
  {
        return call_int_hook(binder_set_context_mgr, 0, mgr);
  }
 +EXPORT_SYMBOL_GPL(security_binder_set_context_mgr);
  
- int security_binder_transaction(const struct cred *from,
-                               const struct cred *to)
+ /**
+  * security_binder_transaction() - Check if a binder transaction is allowed
+@@ -813,6 +814,7 @@ int security_binder_transaction(const st
  {
        return call_int_hook(binder_transaction, 0, from, to);
  }
 +EXPORT_SYMBOL_GPL(security_binder_transaction);
  
- int security_binder_transfer_binder(const struct cred *from,
-                                   const struct cred *to)
+ /**
+  * security_binder_transfer_binder() - Check if a binder transfer is allowed
+@@ -828,6 +830,7 @@ int security_binder_transfer_binder(cons
  {
        return call_int_hook(binder_transfer_binder, 0, from, to);
  }
 +EXPORT_SYMBOL_GPL(security_binder_transfer_binder);
  
- int security_binder_transfer_file(const struct cred *from,
-                                 const struct cred *to, struct file *file)
+ /**
+  * security_binder_transfer_file() - Check if a binder file xfer is allowed
+@@ -844,6 +847,7 @@ int security_binder_transfer_file(const
  {
        return call_int_hook(binder_transfer_file, 0, from, to, file);
  }
 +EXPORT_SYMBOL_GPL(security_binder_transfer_file);
  
- int security_ptrace_access_check(struct task_struct *child, unsigned int mode)
- {
+ /**
+  * security_ptrace_access_check() - Check if tracing is allowed
 --- a/ipc/namespace.c~ 2022-12-11 23:15:18.000000000 +0100
 +++ b/ipc/namespace.c  2022-12-29 16:10:27.771070995 +0100
 @@ -188,6 +188,7 @@
  
  struct msg_msgseg {
        struct msg_msgseg *next;
+--- linux-6.3/mm/memory.c.orig 2023-04-23 21:02:52.000000000 +0200
++++ linux-6.3/mm/memory.c      2023-04-26 10:57:23.873394940 +0200
+@@ -1728,6 +1728,7 @@
+       tlb_finish_mmu(&tlb);
+       hugetlb_zap_end(vma, details);
+ }
++EXPORT_SYMBOL_GPL(zap_page_range_single);
+ /**
+  * zap_vma_ptes - remove ptes mapping the vma
This page took 0.046739 seconds and 4 git commands to generate.