--- linux-2.6.20/grsecurity/gracl_shm.c~ 2007-03-24 04:54:27.000000000 +0100 +++ linux-2.6.20/grsecurity/gracl_shm.c 2007-03-24 04:55:46.332159000 +0100 @@ -6,6 +6,7 @@ #include #include #include +#include int gr_handle_shmat(const pid_t shm_cprid, const pid_t shm_lapid, --- linux-2.6.20/localversion-grsec 2007-03-24 04:54:27.000000000 +0100 +++ /dev/null 2007-03-24 05:05:10.455414500 +0100 @@ -1 +0,0 @@ --grsec --- linux-2.6.20/grsecurity/grsec_sock.c~ 2007-03-24 05:38:40.000000000 +0100 +++ linux-2.6.20/grsecurity/grsec_sock.c 2007-03-24 05:47:11.347998750 +0100 @@ -7,6 +7,7 @@ #include #include #include +#include #include #include #include === === analogous as capable() === --- linux-2.6.37/kernel/capability.c~ 2011-02-23 10:36:01.806613056 +0100 +++ linux-2.6.37/kernel/capability.c 2011-02-23 10:53:44.781787616 +0100 @@ -325,6 +325,9 @@ int capable_nolog(int cap) { + /* here for now so we don't require task locking */ + if (vs_check_bit(VXC_CAP_MASK, cap) && !vx_mcaps(1L << cap)) + return 0; if (unlikely(!cap_valid(cap))) { printk(KERN_CRIT "capable() called with invalid cap=%u\n", cap); BUG();