1 --- linux-2.6.20/grsecurity/gracl_shm.c~ 2007-03-24 04:54:27.000000000 +0100
2 +++ linux-2.6.20/grsecurity/gracl_shm.c 2007-03-24 04:55:46.332159000 +0100
4 #include <linux/gracl.h>
5 #include <linux/grsecurity.h>
6 #include <linux/grinternal.h>
7 +#include <linux/vs_pid.h>
10 gr_handle_shmat(const pid_t shm_cprid, const pid_t shm_lapid,
11 --- linux-2.6.20/localversion-grsec 2007-03-24 04:54:27.000000000 +0100
12 +++ /dev/null 2007-03-24 05:05:10.455414500 +0100
15 --- linux-2.6.20/grsecurity/grsec_sock.c~ 2007-03-24 05:38:40.000000000 +0100
16 +++ linux-2.6.20/grsecurity/grsec_sock.c 2007-03-24 05:47:11.347998750 +0100
20 #include <net/inet_sock.h>
21 +#include <linux/vs_context.h>
22 #include <linux/grsecurity.h>
23 #include <linux/grinternal.h>
24 #include <linux/gracl.h>
26 === analogous as capable()
28 --- linux-2.6.37/kernel/capability.c~ 2011-02-23 10:36:01.806613056 +0100
29 +++ linux-2.6.37/kernel/capability.c 2011-02-23 10:53:44.781787616 +0100
32 int capable_nolog(int cap)
34 + /* here for now so we don't require task locking */
35 + if (vs_check_bit(VXC_CAP_MASK, cap) && !vx_mcaps(1L << cap))
37 if (unlikely(!cap_valid(cap))) {
38 printk(KERN_CRIT "capable() called with invalid cap=%u\n", cap);