blob: 58afc04c107e40cf9f481a7f9eefefd67dbe74ce [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001#ifndef _LINUX_PRCTL_H
2#define _LINUX_PRCTL_H
3
4/* Values to pass as first argument to prctl() */
5
6#define PR_SET_PDEATHSIG 1 /* Second arg is a signal */
7#define PR_GET_PDEATHSIG 2 /* Second arg is a ptr to return the signal */
8
9/* Get/set current->mm->dumpable */
10#define PR_GET_DUMPABLE 3
11#define PR_SET_DUMPABLE 4
12
13/* Get/set unaligned access control bits (if meaningful) */
14#define PR_GET_UNALIGN 5
15#define PR_SET_UNALIGN 6
16# define PR_UNALIGN_NOPRINT 1 /* silently fix up unaligned user accesses */
17# define PR_UNALIGN_SIGBUS 2 /* generate SIGBUS on unaligned user access */
18
Andrew G. Morgan3898b1b2008-04-28 02:13:40 -070019/* Get/set whether or not to drop capabilities on setuid() away from
20 * uid 0 (as per security/commoncap.c) */
Linus Torvalds1da177e2005-04-16 15:20:36 -070021#define PR_GET_KEEPCAPS 7
22#define PR_SET_KEEPCAPS 8
23
24/* Get/set floating-point emulation control bits (if meaningful) */
25#define PR_GET_FPEMU 9
26#define PR_SET_FPEMU 10
27# define PR_FPEMU_NOPRINT 1 /* silently emulate fp operations accesses */
28# define PR_FPEMU_SIGFPE 2 /* don't emulate fp operations, send SIGFPE instead */
29
30/* Get/set floating-point exception mode (if meaningful) */
31#define PR_GET_FPEXC 11
32#define PR_SET_FPEXC 12
33# define PR_FP_EXC_SW_ENABLE 0x80 /* Use FPEXC for FP exception enables */
34# define PR_FP_EXC_DIV 0x010000 /* floating point divide by zero */
35# define PR_FP_EXC_OVF 0x020000 /* floating point overflow */
36# define PR_FP_EXC_UND 0x040000 /* floating point underflow */
37# define PR_FP_EXC_RES 0x080000 /* floating point inexact result */
38# define PR_FP_EXC_INV 0x100000 /* floating point invalid operation */
39# define PR_FP_EXC_DISABLED 0 /* FP exceptions disabled */
40# define PR_FP_EXC_NONRECOV 1 /* async non-recoverable exc. mode */
41# define PR_FP_EXC_ASYNC 2 /* async recoverable exception mode */
42# define PR_FP_EXC_PRECISE 3 /* precise exception mode */
43
44/* Get/set whether we use statistical process timing or accurate timestamp
45 * based process timing */
46#define PR_GET_TIMING 13
47#define PR_SET_TIMING 14
48# define PR_TIMING_STATISTICAL 0 /* Normal, traditional,
49 statistical process timing */
50# define PR_TIMING_TIMESTAMP 1 /* Accurate timestamp based
51 process timing */
52
53#define PR_SET_NAME 15 /* Set process name */
54#define PR_GET_NAME 16 /* Get process name */
55
Anton Blanchard651d7652006-06-07 16:10:19 +100056/* Get/set process endian */
57#define PR_GET_ENDIAN 19
58#define PR_SET_ENDIAN 20
59# define PR_ENDIAN_BIG 0
60# define PR_ENDIAN_LITTLE 1 /* True little endian mode */
61# define PR_ENDIAN_PPC_LITTLE 2 /* "PowerPC" pseudo little endian */
62
Andrea Arcangeli1d9d02f2007-07-15 23:41:32 -070063/* Get/set process seccomp mode */
64#define PR_GET_SECCOMP 21
65#define PR_SET_SECCOMP 22
66
Andrew G. Morgan3898b1b2008-04-28 02:13:40 -070067/* Get/set the capability bounding set (as per security/commoncap.c) */
Serge E. Hallyn3b7391d2008-02-04 22:29:45 -080068#define PR_CAPBSET_READ 23
69#define PR_CAPBSET_DROP 24
70
Erik Bosman8fb402b2008-04-11 18:54:17 +020071/* Get/set the process' ability to use the timestamp counter instruction */
72#define PR_GET_TSC 25
73#define PR_SET_TSC 26
74# define PR_TSC_ENABLE 1 /* allow the use of the timestamp counter */
75# define PR_TSC_SIGSEGV 2 /* throw a SIGSEGV instead of reading the TSC */
76
Andrew G. Morgan3898b1b2008-04-28 02:13:40 -070077/* Get/set securebits (as per security/commoncap.c) */
78#define PR_GET_SECUREBITS 27
79#define PR_SET_SECUREBITS 28
80
Arjan van de Ven69766752008-09-01 15:52:40 -070081/*
82 * Get/set the timerslack as used by poll/select/nanosleep
83 * A value of 0 means "use default"
84 */
85#define PR_SET_TIMERSLACK 29
86#define PR_GET_TIMERSLACK 30
87
Ingo Molnarcdd6c482009-09-21 12:02:48 +020088#define PR_TASK_PERF_EVENTS_DISABLE 31
89#define PR_TASK_PERF_EVENTS_ENABLE 32
Ingo Molnar1d1c7dd2008-12-11 14:59:31 +010090
Andi Kleen1087e9b2009-10-04 02:20:11 +020091/*
92 * Set early/late kill mode for hwpoison memory corruption.
93 * This influences when the process gets killed on a memory corruption.
94 */
Andi Kleen4db96cf2009-09-16 11:50:14 +020095#define PR_MCE_KILL 33
Andi Kleen1087e9b2009-10-04 02:20:11 +020096# define PR_MCE_KILL_CLEAR 0
97# define PR_MCE_KILL_SET 1
98
99# define PR_MCE_KILL_LATE 0
100# define PR_MCE_KILL_EARLY 1
101# define PR_MCE_KILL_DEFAULT 2
102
103#define PR_MCE_KILL_GET 34
Andi Kleen4db96cf2009-09-16 11:50:14 +0200104
Cyrill Gorcunov028ee4b2012-01-12 17:20:55 -0800105/*
106 * Tune up process memory map specifics.
107 */
108#define PR_SET_MM 35
109# define PR_SET_MM_START_CODE 1
110# define PR_SET_MM_END_CODE 2
111# define PR_SET_MM_START_DATA 3
112# define PR_SET_MM_END_DATA 4
113# define PR_SET_MM_START_STACK 5
114# define PR_SET_MM_START_BRK 6
115# define PR_SET_MM_BRK 7
Cyrill Gorcunovfe8c7f52012-05-31 16:26:45 -0700116# define PR_SET_MM_ARG_START 8
117# define PR_SET_MM_ARG_END 9
118# define PR_SET_MM_ENV_START 10
119# define PR_SET_MM_ENV_END 11
120# define PR_SET_MM_AUXV 12
Cyrill Gorcunovb32dfe32012-05-31 16:26:46 -0700121# define PR_SET_MM_EXE_FILE 13
Cyrill Gorcunov028ee4b2012-01-12 17:20:55 -0800122
Kees Cook2d514482011-12-21 12:17:04 -0800123/*
124 * Set specific pid that is allowed to ptrace the current task.
125 * A value of 0 mean "no process".
126 */
127#define PR_SET_PTRACER 0x59616d61
Kees Cookbf061892012-02-14 16:48:09 -0800128# define PR_SET_PTRACER_ANY ((unsigned long)-1)
Kees Cook2d514482011-12-21 12:17:04 -0800129
Cyrill Gorcunov300f7862012-06-07 14:21:12 -0700130#define PR_SET_CHILD_SUBREAPER 36
131#define PR_GET_CHILD_SUBREAPER 37
Lennart Poetteringebec18a2012-03-23 15:01:54 -0700132
Andy Lutomirski259e5e62012-04-12 16:47:50 -0500133/*
134 * If no_new_privs is set, then operations that grant new privileges (i.e.
135 * execve) will either fail or not grant them. This affects suid/sgid,
136 * file capabilities, and LSMs.
137 *
138 * Operations that merely manipulate or drop existing privileges (setresuid,
139 * capset, etc.) will still work. Drop those privileges if you want them gone.
140 *
141 * Changing LSM security domain is considered a new privilege. So, for example,
142 * asking selinux for a specific new context (e.g. with runcon) will result
143 * in execve returning -EPERM.
Andy Lutomirskic5405212012-07-05 11:23:24 -0700144 *
145 * See Documentation/prctl/no_new_privs.txt for more details.
Andy Lutomirski259e5e62012-04-12 16:47:50 -0500146 */
Cyrill Gorcunov300f7862012-06-07 14:21:12 -0700147#define PR_SET_NO_NEW_PRIVS 38
148#define PR_GET_NO_NEW_PRIVS 39
149
150#define PR_GET_TID_ADDRESS 40
Andy Lutomirski259e5e62012-04-12 16:47:50 -0500151
Alex Thorltona0715cc2014-04-07 15:37:10 -0700152#define PR_SET_THP_DISABLE 41
153#define PR_GET_THP_DISABLE 42
154
Linus Torvalds1da177e2005-04-16 15:20:36 -0700155#endif /* _LINUX_PRCTL_H */