diff options
Diffstat (limited to 'vendor/linux-raw-sys/src/x86')
-rw-r--r-- | vendor/linux-raw-sys/src/x86/general.rs | 50 |
1 files changed, 50 insertions, 0 deletions
diff --git a/vendor/linux-raw-sys/src/x86/general.rs b/vendor/linux-raw-sys/src/x86/general.rs index 437f0cba0..687c4b6e3 100644 --- a/vendor/linux-raw-sys/src/x86/general.rs +++ b/vendor/linux-raw-sys/src/x86/general.rs @@ -2355,6 +2355,42 @@ pub const P_ALL: u32 = 0; pub const P_PID: u32 = 1; pub const P_PGID: u32 = 2; pub const P_PIDFD: u32 = 3; +pub const XATTR_CREATE: u32 = 1; +pub const XATTR_REPLACE: u32 = 2; +pub const XATTR_OS2_PREFIX: &[u8; 5usize] = b"os2.\0"; +pub const XATTR_MAC_OSX_PREFIX: &[u8; 5usize] = b"osx.\0"; +pub const XATTR_BTRFS_PREFIX: &[u8; 7usize] = b"btrfs.\0"; +pub const XATTR_HURD_PREFIX: &[u8; 5usize] = b"gnu.\0"; +pub const XATTR_SECURITY_PREFIX: &[u8; 10usize] = b"security.\0"; +pub const XATTR_SYSTEM_PREFIX: &[u8; 8usize] = b"system.\0"; +pub const XATTR_TRUSTED_PREFIX: &[u8; 9usize] = b"trusted.\0"; +pub const XATTR_USER_PREFIX: &[u8; 6usize] = b"user.\0"; +pub const XATTR_EVM_SUFFIX: &[u8; 4usize] = b"evm\0"; +pub const XATTR_NAME_EVM: &[u8; 13usize] = b"security.evm\0"; +pub const XATTR_IMA_SUFFIX: &[u8; 4usize] = b"ima\0"; +pub const XATTR_NAME_IMA: &[u8; 13usize] = b"security.ima\0"; +pub const XATTR_SELINUX_SUFFIX: &[u8; 8usize] = b"selinux\0"; +pub const XATTR_NAME_SELINUX: &[u8; 17usize] = b"security.selinux\0"; +pub const XATTR_SMACK_SUFFIX: &[u8; 8usize] = b"SMACK64\0"; +pub const XATTR_SMACK_IPIN: &[u8; 12usize] = b"SMACK64IPIN\0"; +pub const XATTR_SMACK_IPOUT: &[u8; 13usize] = b"SMACK64IPOUT\0"; +pub const XATTR_SMACK_EXEC: &[u8; 12usize] = b"SMACK64EXEC\0"; +pub const XATTR_SMACK_TRANSMUTE: &[u8; 17usize] = b"SMACK64TRANSMUTE\0"; +pub const XATTR_SMACK_MMAP: &[u8; 12usize] = b"SMACK64MMAP\0"; +pub const XATTR_NAME_SMACK: &[u8; 17usize] = b"security.SMACK64\0"; +pub const XATTR_NAME_SMACKIPIN: &[u8; 21usize] = b"security.SMACK64IPIN\0"; +pub const XATTR_NAME_SMACKIPOUT: &[u8; 22usize] = b"security.SMACK64IPOUT\0"; +pub const XATTR_NAME_SMACKEXEC: &[u8; 21usize] = b"security.SMACK64EXEC\0"; +pub const XATTR_NAME_SMACKTRANSMUTE: &[u8; 26usize] = b"security.SMACK64TRANSMUTE\0"; +pub const XATTR_NAME_SMACKMMAP: &[u8; 21usize] = b"security.SMACK64MMAP\0"; +pub const XATTR_APPARMOR_SUFFIX: &[u8; 9usize] = b"apparmor\0"; +pub const XATTR_NAME_APPARMOR: &[u8; 18usize] = b"security.apparmor\0"; +pub const XATTR_CAPS_SUFFIX: &[u8; 11usize] = b"capability\0"; +pub const XATTR_NAME_CAPS: &[u8; 20usize] = b"security.capability\0"; +pub const XATTR_POSIX_ACL_ACCESS: &[u8; 17usize] = b"posix_acl_access\0"; +pub const XATTR_NAME_POSIX_ACL_ACCESS: &[u8; 24usize] = b"system.posix_acl_access\0"; +pub const XATTR_POSIX_ACL_DEFAULT: &[u8; 18usize] = b"posix_acl_default\0"; +pub const XATTR_NAME_POSIX_ACL_DEFAULT: &[u8; 25usize] = b"system.posix_acl_default\0"; pub const MFD_CLOEXEC: u32 = 1; pub const MFD_ALLOW_SEALING: u32 = 2; pub const MFD_HUGETLB: u32 = 4; @@ -2608,6 +2644,7 @@ pub const MNT_DETACH: u32 = 2; pub const MNT_EXPIRE: u32 = 4; pub const UMOUNT_NOFOLLOW: u32 = 8; pub const UMOUNT_UNUSED: u32 = 2147483648; +pub const _NSIG: u32 = 64; pub type size_t = crate::ctypes::c_uint; pub type ssize_t = crate::ctypes::c_int; pub type __s8 = crate::ctypes::c_schar; @@ -5376,3 +5413,16 @@ pub struct mmsghdr { pub msg_hdr: msghdr, pub msg_len: crate::ctypes::c_uint, } +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct kernel_sigset_t { +pub sig: [crate::ctypes::c_ulong; 2usize], +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct kernel_sigaction { +pub sa_handler_kernel: __kernel_sighandler_t, +pub sa_flags: crate::ctypes::c_ulong, +pub sa_restorer: __sigrestore_t, +pub sa_mask: kernel_sigset_t, +} |