Latest Threat Research:SANDWORM_MODE: Shai-Hulud-Style npm Worm Hijacks CI Workflows and Poisons AI Toolchains.Details
Socket
Book a DemoInstallSign in
Socket

rustix

Package Overview
Dependencies
Maintainers
1
Versions
169
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

rustix - npm Package Compare versions

Comparing version
1.1.1
to
1.1.2
+1
-1
.cargo_vcs_info.json
{
"git": {
"sha1": "5dc84d40cc53a20258f5b184093f9e659e2167be"
"sha1": "5245b8160d53a04c37164779cfb11d35e18f55b3"
},
"path_in_vcs": ""
}

@@ -424,6 +424,2 @@ # This file is automatically @generated by Cargo.

checksum = "cd945864f07fe9f5371a27ad7b52a172b4b499999f1d97574c9fa68373937e12"
dependencies = [
"compiler_builtins",
"rustc-std-workspace-core",
]

@@ -678,3 +674,3 @@ [[package]]

name = "rustix"
version = "1.1.1"
version = "1.1.2"
dependencies = [

@@ -687,3 +683,2 @@ "bitflags 2.9.1",

"linux-raw-sys 0.11.0",
"linux-raw-sys 0.9.4",
"memoffset",

@@ -690,0 +685,0 @@ "once_cell",

@@ -16,3 +16,3 @@ # THIS FILE IS AUTOMATICALLY GENERATED BY CARGO

name = "rustix"
version = "1.1.1"
version = "1.1.2"
authors = [

@@ -196,3 +196,3 @@ "Dan Gohman <dev@sunfishcode.online>",

[target.'cfg(all(any(target_os = "linux"), any(rustix_use_libc, miri, not(all(target_os = "linux", any(target_endian = "little", any(target_arch = "s390x", target_arch = "powerpc")), any(target_arch = "arm", all(target_arch = "aarch64", target_pointer_width = "64"), target_arch = "riscv64", all(rustix_use_experimental_asm, target_arch = "powerpc"), all(rustix_use_experimental_asm, target_arch = "powerpc64"), all(rustix_use_experimental_asm, target_arch = "s390x"), all(rustix_use_experimental_asm, target_arch = "mips"), all(rustix_use_experimental_asm, target_arch = "mips32r6"), all(rustix_use_experimental_asm, target_arch = "mips64"), all(rustix_use_experimental_asm, target_arch = "mips64r6"), target_arch = "x86", all(target_arch = "x86_64", target_pointer_width = "64")))))))'.dependencies.linux-raw-sys]
version = "0.9.2"
version = "0.11.0"
features = [

@@ -199,0 +199,0 @@ "general",

@@ -66,3 +66,3 @@ //! Libc and supplemental types and constants.

pub(crate) const ETH_P_MCTP: c_int = linux_raw_sys::if_ether::ETH_P_MCTP as _;
#[cfg(all(linux_kernel, feature = "mount"))]
#[cfg(all(linux_raw_dep, feature = "mount"))]
pub(crate) const MS_NOSYMFOLLOW: c_ulong = linux_raw_sys::general::MS_NOSYMFOLLOW as _;

@@ -84,5 +84,5 @@

// TODO: Upstream these.
#[cfg(all(linux_kernel, feature = "termios"))]
#[cfg(all(linux_raw_dep, feature = "termios"))]
pub(crate) const IUCLC: tcflag_t = linux_raw_sys::general::IUCLC as _;
#[cfg(all(linux_kernel, feature = "termios"))]
#[cfg(all(linux_raw_dep, feature = "termios"))]
pub(crate) const XCASE: tcflag_t = linux_raw_sys::general::XCASE as _;

@@ -89,0 +89,0 @@

@@ -60,2 +60,3 @@ use crate::backend::c;

/// `MS_NOSYMFOLLOW`
#[cfg(linux_raw_dep)]
const NOSYMFOLLOW = c::MS_NOSYMFOLLOW;

@@ -62,0 +63,0 @@

@@ -13,2 +13,3 @@ //! Helper functions for `prctl` syscalls.

#[cfg(linux_raw_dep)]
bitflags! {

@@ -15,0 +16,0 @@ /// `PR_PAC_AP*`

@@ -1086,2 +1086,3 @@ //! Bindings for the Linux `prctl` system call.

#[doc(alias = "PR_PAC_GET_ENABLED_KEYS")]
#[cfg(linux_raw_dep)]
pub fn enabled_pointer_authentication_keys() -> io::Result<PointerAuthenticationKeys> {

@@ -1107,2 +1108,3 @@ let r = unsafe { prctl_1arg(PR_PAC_GET_ENABLED_KEYS)? } as c_uint;

#[doc(alias = "PR_PAC_SET_ENABLED_KEYS")]
#[cfg(linux_raw_dep)]
pub unsafe fn configure_pointer_authentication_keys<

@@ -1109,0 +1111,0 @@ Config: Iterator<Item = (PointerAuthenticationKeys, bool)>,

@@ -278,3 +278,3 @@ use crate::backend::c;

/// `IUCLC`
#[cfg(any(linux_kernel, solarish, target_os = "aix", target_os = "haiku", target_os = "nto"))]
#[cfg(any(linux_raw_dep, solarish, target_os = "aix", target_os = "haiku", target_os = "nto"))]
const IUCLC = c::IUCLC;

@@ -601,3 +601,3 @@

/// `XCASE`
#[cfg(any(linux_kernel, target_arch = "s390x", target_os = "haiku"))]
#[cfg(any(linux_raw_dep, target_arch = "s390x", target_os = "haiku"))]
const XCASE = c::XCASE;

@@ -604,0 +604,0 @@

@@ -26,5 +26,5 @@ //! Linux `prctl` wrappers.

use crate::pid::Pid;
use crate::prctl::{
prctl_1arg, prctl_2args, prctl_3args, prctl_get_at_arg2_optional, PointerAuthenticationKeys,
};
#[cfg(linux_raw_dep)]
use crate::prctl::PointerAuthenticationKeys;
use crate::prctl::{prctl_1arg, prctl_2args, prctl_3args, prctl_get_at_arg2_optional};
use crate::utils::as_ptr;

@@ -855,2 +855,3 @@

#[inline]
#[cfg(linux_raw_dep)]
pub unsafe fn reset_pointer_authentication_keys(

@@ -857,0 +858,0 @@ keys: Option<PointerAuthenticationKeys>,

Sorry, the diff of this file is not supported yet