summaryrefslogtreecommitdiffstats
path: root/vendor/linux-raw-sys/src/riscv32
diff options
context:
space:
mode:
Diffstat (limited to 'vendor/linux-raw-sys/src/riscv32')
-rw-r--r--vendor/linux-raw-sys/src/riscv32/general.rs48
1 files changed, 48 insertions, 0 deletions
diff --git a/vendor/linux-raw-sys/src/riscv32/general.rs b/vendor/linux-raw-sys/src/riscv32/general.rs
index 85e971a82..eaed2562f 100644
--- a/vendor/linux-raw-sys/src/riscv32/general.rs
+++ b/vendor/linux-raw-sys/src/riscv32/general.rs
@@ -2226,6 +2226,42 @@ pub const P_ALL: u32 = 0;
pub const P_PID: u32 = 1;
pub const P_PGID: u32 = 2;
pub const P_PIDFD: u32 = 3;
+pub const XATTR_CREATE: u32 = 1;
+pub const XATTR_REPLACE: u32 = 2;
+pub const XATTR_OS2_PREFIX: &[u8; 5usize] = b"os2.\0";
+pub const XATTR_MAC_OSX_PREFIX: &[u8; 5usize] = b"osx.\0";
+pub const XATTR_BTRFS_PREFIX: &[u8; 7usize] = b"btrfs.\0";
+pub const XATTR_HURD_PREFIX: &[u8; 5usize] = b"gnu.\0";
+pub const XATTR_SECURITY_PREFIX: &[u8; 10usize] = b"security.\0";
+pub const XATTR_SYSTEM_PREFIX: &[u8; 8usize] = b"system.\0";
+pub const XATTR_TRUSTED_PREFIX: &[u8; 9usize] = b"trusted.\0";
+pub const XATTR_USER_PREFIX: &[u8; 6usize] = b"user.\0";
+pub const XATTR_EVM_SUFFIX: &[u8; 4usize] = b"evm\0";
+pub const XATTR_NAME_EVM: &[u8; 13usize] = b"security.evm\0";
+pub const XATTR_IMA_SUFFIX: &[u8; 4usize] = b"ima\0";
+pub const XATTR_NAME_IMA: &[u8; 13usize] = b"security.ima\0";
+pub const XATTR_SELINUX_SUFFIX: &[u8; 8usize] = b"selinux\0";
+pub const XATTR_NAME_SELINUX: &[u8; 17usize] = b"security.selinux\0";
+pub const XATTR_SMACK_SUFFIX: &[u8; 8usize] = b"SMACK64\0";
+pub const XATTR_SMACK_IPIN: &[u8; 12usize] = b"SMACK64IPIN\0";
+pub const XATTR_SMACK_IPOUT: &[u8; 13usize] = b"SMACK64IPOUT\0";
+pub const XATTR_SMACK_EXEC: &[u8; 12usize] = b"SMACK64EXEC\0";
+pub const XATTR_SMACK_TRANSMUTE: &[u8; 17usize] = b"SMACK64TRANSMUTE\0";
+pub const XATTR_SMACK_MMAP: &[u8; 12usize] = b"SMACK64MMAP\0";
+pub const XATTR_NAME_SMACK: &[u8; 17usize] = b"security.SMACK64\0";
+pub const XATTR_NAME_SMACKIPIN: &[u8; 21usize] = b"security.SMACK64IPIN\0";
+pub const XATTR_NAME_SMACKIPOUT: &[u8; 22usize] = b"security.SMACK64IPOUT\0";
+pub const XATTR_NAME_SMACKEXEC: &[u8; 21usize] = b"security.SMACK64EXEC\0";
+pub const XATTR_NAME_SMACKTRANSMUTE: &[u8; 26usize] = b"security.SMACK64TRANSMUTE\0";
+pub const XATTR_NAME_SMACKMMAP: &[u8; 21usize] = b"security.SMACK64MMAP\0";
+pub const XATTR_APPARMOR_SUFFIX: &[u8; 9usize] = b"apparmor\0";
+pub const XATTR_NAME_APPARMOR: &[u8; 18usize] = b"security.apparmor\0";
+pub const XATTR_CAPS_SUFFIX: &[u8; 11usize] = b"capability\0";
+pub const XATTR_NAME_CAPS: &[u8; 20usize] = b"security.capability\0";
+pub const XATTR_POSIX_ACL_ACCESS: &[u8; 17usize] = b"posix_acl_access\0";
+pub const XATTR_NAME_POSIX_ACL_ACCESS: &[u8; 24usize] = b"system.posix_acl_access\0";
+pub const XATTR_POSIX_ACL_DEFAULT: &[u8; 18usize] = b"posix_acl_default\0";
+pub const XATTR_NAME_POSIX_ACL_DEFAULT: &[u8; 25usize] = b"system.posix_acl_default\0";
pub const MFD_CLOEXEC: u32 = 1;
pub const MFD_ALLOW_SEALING: u32 = 2;
pub const MFD_HUGETLB: u32 = 4;
@@ -5226,3 +5262,15 @@ pub struct mmsghdr {
pub msg_hdr: msghdr,
pub msg_len: crate::ctypes::c_uint,
}
+#[repr(C)]
+#[derive(Debug, Copy, Clone)]
+pub struct kernel_sigset_t {
+pub sig: [crate::ctypes::c_ulong; 2usize],
+}
+#[repr(C)]
+#[derive(Debug, Copy, Clone)]
+pub struct kernel_sigaction {
+pub sa_handler_kernel: __kernel_sighandler_t,
+pub sa_flags: crate::ctypes::c_ulong,
+pub sa_mask: kernel_sigset_t,
+}