forked from Qortal/Brooklyn
2a709f28fa
* 0day explit mitigation * Memory corruption prevention * Privilege escalation prevention * Buffer over flow prevention * File System corruption defense * Thread escape prevention This may very well be the most intensive inclusion to BrooklynR. This will not be part of an x86 suite nor it will be released as tool kit. The security core toolkit will remain part of kernel base.
33 lines
658 B
C
33 lines
658 B
C
/*
|
|
* if_addrlabel.h - netlink interface for address labels
|
|
*
|
|
* Copyright (C)2007 USAGI/WIDE Project, All Rights Reserved.
|
|
*
|
|
* Authors:
|
|
* YOSHIFUJI Hideaki @ USAGI/WIDE <yoshfuji@linux-ipv6.org>
|
|
*/
|
|
|
|
#ifndef __LINUX_IF_ADDRLABEL_H
|
|
#define __LINUX_IF_ADDRLABEL_H
|
|
|
|
#include <linux/types.h>
|
|
|
|
struct ifaddrlblmsg {
|
|
__u8 ifal_family; /* Address family */
|
|
__u8 __ifal_reserved; /* Reserved */
|
|
__u8 ifal_prefixlen; /* Prefix length */
|
|
__u8 ifal_flags; /* Flags */
|
|
__u32 ifal_index; /* Link index */
|
|
__u32 ifal_seq; /* sequence number */
|
|
};
|
|
|
|
enum {
|
|
IFAL_ADDRESS = 1,
|
|
IFAL_LABEL = 2,
|
|
__IFAL_MAX
|
|
};
|
|
|
|
#define IFAL_MAX (__IFAL_MAX - 1)
|
|
|
|
#endif
|