#include <linux/module.h>
#include <linux/security.h>
#include <linux/syscalls.h>
+#include <linux/vs_cvirt.h>
#include <asm/uaccess.h>
#include <linux/vs_base.h>
int ret = 0;
pid_t pid;
__u32 version;
- struct task_struct *target;
+ task_t *target;
struct __user_cap_data_struct data;
if (get_user(version, &header->version))
kernel_cap_t *inheritable,
kernel_cap_t *permitted)
{
- struct task_struct *g, *target;
+ task_t *g, *target;
int ret = -EPERM;
int found = 0;
kernel_cap_t *inheritable,
kernel_cap_t *permitted)
{
- struct task_struct *g, *target;
+ task_t *g, *target;
int ret = -EPERM;
int found = 0;
{
kernel_cap_t inheritable, permitted, effective;
__u32 version;
- struct task_struct *target;
+ task_t *target;
int ret;
pid_t pid;
return ret;
}
-
-int __capable(struct task_struct *t, int cap)
-{
- if (security_capable(t, cap) == 0) {
- t->flags |= PF_SUPERPRIV;
- return 1;
- }
- return 0;
-}
-EXPORT_SYMBOL(__capable);
-
-int capable(int cap)
-{
- /* here for now so we don't require task locking */
- if (vx_check_bit(VXC_CAP_MASK, cap) && !vx_mcaps(1L << cap))
- return 0;
- return __capable(current, cap);
-}
-EXPORT_SYMBOL(capable);