Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | #ifndef _LINUX_PRCTL_H |
2 | #define _LINUX_PRCTL_H | |
3 | ||
4 | /* Values to pass as first argument to prctl() */ | |
5 | ||
6 | #define PR_SET_PDEATHSIG 1 /* Second arg is a signal */ | |
7 | #define PR_GET_PDEATHSIG 2 /* Second arg is a ptr to return the signal */ | |
8 | ||
9 | /* Get/set current->mm->dumpable */ | |
10 | #define PR_GET_DUMPABLE 3 | |
11 | #define PR_SET_DUMPABLE 4 | |
12 | ||
13 | /* Get/set unaligned access control bits (if meaningful) */ | |
14 | #define PR_GET_UNALIGN 5 | |
15 | #define PR_SET_UNALIGN 6 | |
16 | # define PR_UNALIGN_NOPRINT 1 /* silently fix up unaligned user accesses */ | |
17 | # define PR_UNALIGN_SIGBUS 2 /* generate SIGBUS on unaligned user access */ | |
18 | ||
3898b1b4 AM |
19 | /* Get/set whether or not to drop capabilities on setuid() away from |
20 | * uid 0 (as per security/commoncap.c) */ | |
1da177e4 LT |
21 | #define PR_GET_KEEPCAPS 7 |
22 | #define PR_SET_KEEPCAPS 8 | |
23 | ||
24 | /* Get/set floating-point emulation control bits (if meaningful) */ | |
25 | #define PR_GET_FPEMU 9 | |
26 | #define PR_SET_FPEMU 10 | |
27 | # define PR_FPEMU_NOPRINT 1 /* silently emulate fp operations accesses */ | |
28 | # define PR_FPEMU_SIGFPE 2 /* don't emulate fp operations, send SIGFPE instead */ | |
29 | ||
30 | /* Get/set floating-point exception mode (if meaningful) */ | |
31 | #define PR_GET_FPEXC 11 | |
32 | #define PR_SET_FPEXC 12 | |
33 | # define PR_FP_EXC_SW_ENABLE 0x80 /* Use FPEXC for FP exception enables */ | |
34 | # define PR_FP_EXC_DIV 0x010000 /* floating point divide by zero */ | |
35 | # define PR_FP_EXC_OVF 0x020000 /* floating point overflow */ | |
36 | # define PR_FP_EXC_UND 0x040000 /* floating point underflow */ | |
37 | # define PR_FP_EXC_RES 0x080000 /* floating point inexact result */ | |
38 | # define PR_FP_EXC_INV 0x100000 /* floating point invalid operation */ | |
39 | # define PR_FP_EXC_DISABLED 0 /* FP exceptions disabled */ | |
40 | # define PR_FP_EXC_NONRECOV 1 /* async non-recoverable exc. mode */ | |
41 | # define PR_FP_EXC_ASYNC 2 /* async recoverable exception mode */ | |
42 | # define PR_FP_EXC_PRECISE 3 /* precise exception mode */ | |
43 | ||
44 | /* Get/set whether we use statistical process timing or accurate timestamp | |
45 | * based process timing */ | |
46 | #define PR_GET_TIMING 13 | |
47 | #define PR_SET_TIMING 14 | |
48 | # define PR_TIMING_STATISTICAL 0 /* Normal, traditional, | |
49 | statistical process timing */ | |
50 | # define PR_TIMING_TIMESTAMP 1 /* Accurate timestamp based | |
51 | process timing */ | |
52 | ||
53 | #define PR_SET_NAME 15 /* Set process name */ | |
54 | #define PR_GET_NAME 16 /* Get process name */ | |
55 | ||
651d765d AB |
56 | /* Get/set process endian */ |
57 | #define PR_GET_ENDIAN 19 | |
58 | #define PR_SET_ENDIAN 20 | |
59 | # define PR_ENDIAN_BIG 0 | |
60 | # define PR_ENDIAN_LITTLE 1 /* True little endian mode */ | |
61 | # define PR_ENDIAN_PPC_LITTLE 2 /* "PowerPC" pseudo little endian */ | |
62 | ||
1d9d02fe AA |
63 | /* Get/set process seccomp mode */ |
64 | #define PR_GET_SECCOMP 21 | |
65 | #define PR_SET_SECCOMP 22 | |
66 | ||
3898b1b4 | 67 | /* Get/set the capability bounding set (as per security/commoncap.c) */ |
3b7391de SH |
68 | #define PR_CAPBSET_READ 23 |
69 | #define PR_CAPBSET_DROP 24 | |
70 | ||
8fb402bc EB |
71 | /* Get/set the process' ability to use the timestamp counter instruction */ |
72 | #define PR_GET_TSC 25 | |
73 | #define PR_SET_TSC 26 | |
74 | # define PR_TSC_ENABLE 1 /* allow the use of the timestamp counter */ | |
75 | # define PR_TSC_SIGSEGV 2 /* throw a SIGSEGV instead of reading the TSC */ | |
76 | ||
3898b1b4 AM |
77 | /* Get/set securebits (as per security/commoncap.c) */ |
78 | #define PR_GET_SECUREBITS 27 | |
79 | #define PR_SET_SECUREBITS 28 | |
80 | ||
6976675d AV |
81 | /* |
82 | * Get/set the timerslack as used by poll/select/nanosleep | |
83 | * A value of 0 means "use default" | |
84 | */ | |
85 | #define PR_SET_TIMERSLACK 29 | |
86 | #define PR_GET_TIMERSLACK 30 | |
87 | ||
cdd6c482 IM |
88 | #define PR_TASK_PERF_EVENTS_DISABLE 31 |
89 | #define PR_TASK_PERF_EVENTS_ENABLE 32 | |
1d1c7ddb | 90 | |
1087e9b4 AK |
91 | /* |
92 | * Set early/late kill mode for hwpoison memory corruption. | |
93 | * This influences when the process gets killed on a memory corruption. | |
94 | */ | |
4db96cf0 | 95 | #define PR_MCE_KILL 33 |
1087e9b4 AK |
96 | # define PR_MCE_KILL_CLEAR 0 |
97 | # define PR_MCE_KILL_SET 1 | |
98 | ||
99 | # define PR_MCE_KILL_LATE 0 | |
100 | # define PR_MCE_KILL_EARLY 1 | |
101 | # define PR_MCE_KILL_DEFAULT 2 | |
102 | ||
103 | #define PR_MCE_KILL_GET 34 | |
4db96cf0 | 104 | |
028ee4be CG |
105 | /* |
106 | * Tune up process memory map specifics. | |
107 | */ | |
108 | #define PR_SET_MM 35 | |
109 | # define PR_SET_MM_START_CODE 1 | |
110 | # define PR_SET_MM_END_CODE 2 | |
111 | # define PR_SET_MM_START_DATA 3 | |
112 | # define PR_SET_MM_END_DATA 4 | |
113 | # define PR_SET_MM_START_STACK 5 | |
114 | # define PR_SET_MM_START_BRK 6 | |
115 | # define PR_SET_MM_BRK 7 | |
fe8c7f5c CG |
116 | # define PR_SET_MM_ARG_START 8 |
117 | # define PR_SET_MM_ARG_END 9 | |
118 | # define PR_SET_MM_ENV_START 10 | |
119 | # define PR_SET_MM_ENV_END 11 | |
120 | # define PR_SET_MM_AUXV 12 | |
b32dfe37 | 121 | # define PR_SET_MM_EXE_FILE 13 |
028ee4be | 122 | |
2d514487 KC |
123 | /* |
124 | * Set specific pid that is allowed to ptrace the current task. | |
125 | * A value of 0 mean "no process". | |
126 | */ | |
127 | #define PR_SET_PTRACER 0x59616d61 | |
bf06189e | 128 | # define PR_SET_PTRACER_ANY ((unsigned long)-1) |
2d514487 | 129 | |
300f786b CG |
130 | #define PR_SET_CHILD_SUBREAPER 36 |
131 | #define PR_GET_CHILD_SUBREAPER 37 | |
ebec18a6 | 132 | |
259e5e6c AL |
133 | /* |
134 | * If no_new_privs is set, then operations that grant new privileges (i.e. | |
135 | * execve) will either fail or not grant them. This affects suid/sgid, | |
136 | * file capabilities, and LSMs. | |
137 | * | |
138 | * Operations that merely manipulate or drop existing privileges (setresuid, | |
139 | * capset, etc.) will still work. Drop those privileges if you want them gone. | |
140 | * | |
141 | * Changing LSM security domain is considered a new privilege. So, for example, | |
142 | * asking selinux for a specific new context (e.g. with runcon) will result | |
143 | * in execve returning -EPERM. | |
c540521b AL |
144 | * |
145 | * See Documentation/prctl/no_new_privs.txt for more details. | |
259e5e6c | 146 | */ |
300f786b CG |
147 | #define PR_SET_NO_NEW_PRIVS 38 |
148 | #define PR_GET_NO_NEW_PRIVS 39 | |
149 | ||
150 | #define PR_GET_TID_ADDRESS 40 | |
259e5e6c | 151 | |
1da177e4 | 152 | #endif /* _LINUX_PRCTL_H */ |