aboutsummaryrefslogtreecommitdiffstats
path: root/include/linux/prctl.h
diff options
context:
space:
mode:
Diffstat (limited to 'include/linux/prctl.h')
-rw-r--r--include/linux/prctl.h21
1 files changed, 21 insertions, 0 deletions
diff --git a/include/linux/prctl.h b/include/linux/prctl.h
index e0cfec2490aa..711e0a30aacc 100644
--- a/include/linux/prctl.h
+++ b/include/linux/prctl.h
@@ -113,6 +113,12 @@
113# define PR_SET_MM_START_STACK 5 113# define PR_SET_MM_START_STACK 5
114# define PR_SET_MM_START_BRK 6 114# define PR_SET_MM_START_BRK 6
115# define PR_SET_MM_BRK 7 115# define PR_SET_MM_BRK 7
116# define PR_SET_MM_ARG_START 8
117# define PR_SET_MM_ARG_END 9
118# define PR_SET_MM_ENV_START 10
119# define PR_SET_MM_ENV_END 11
120# define PR_SET_MM_AUXV 12
121# define PR_SET_MM_EXE_FILE 13
116 122
117/* 123/*
118 * Set specific pid that is allowed to ptrace the current task. 124 * Set specific pid that is allowed to ptrace the current task.
@@ -124,4 +130,19 @@
124#define PR_SET_CHILD_SUBREAPER 36 130#define PR_SET_CHILD_SUBREAPER 36
125#define PR_GET_CHILD_SUBREAPER 37 131#define PR_GET_CHILD_SUBREAPER 37
126 132
133/*
134 * If no_new_privs is set, then operations that grant new privileges (i.e.
135 * execve) will either fail or not grant them. This affects suid/sgid,
136 * file capabilities, and LSMs.
137 *
138 * Operations that merely manipulate or drop existing privileges (setresuid,
139 * capset, etc.) will still work. Drop those privileges if you want them gone.
140 *
141 * Changing LSM security domain is considered a new privilege. So, for example,
142 * asking selinux for a specific new context (e.g. with runcon) will result
143 * in execve returning -EPERM.
144 */
145#define PR_SET_NO_NEW_PRIVS 38
146#define PR_GET_NO_NEW_PRIVS 39
147
127#endif /* _LINUX_PRCTL_H */ 148#endif /* _LINUX_PRCTL_H */