]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - include/uapi/linux/prctl.h
prctl: Add force disable speculation
[mirror_ubuntu-artful-kernel.git] / include / uapi / linux / prctl.h
CommitLineData
1da177e4
LT
1#ifndef _LINUX_PRCTL_H
2#define _LINUX_PRCTL_H
3
f606b77f
CG
4#include <linux/types.h>
5
1da177e4
LT
6/* Values to pass as first argument to prctl() */
7
8#define PR_SET_PDEATHSIG 1 /* Second arg is a signal */
9#define PR_GET_PDEATHSIG 2 /* Second arg is a ptr to return the signal */
10
11/* Get/set current->mm->dumpable */
12#define PR_GET_DUMPABLE 3
13#define PR_SET_DUMPABLE 4
14
15/* Get/set unaligned access control bits (if meaningful) */
16#define PR_GET_UNALIGN 5
17#define PR_SET_UNALIGN 6
18# define PR_UNALIGN_NOPRINT 1 /* silently fix up unaligned user accesses */
19# define PR_UNALIGN_SIGBUS 2 /* generate SIGBUS on unaligned user access */
20
3898b1b4
AM
21/* Get/set whether or not to drop capabilities on setuid() away from
22 * uid 0 (as per security/commoncap.c) */
1da177e4
LT
23#define PR_GET_KEEPCAPS 7
24#define PR_SET_KEEPCAPS 8
25
26/* Get/set floating-point emulation control bits (if meaningful) */
27#define PR_GET_FPEMU 9
28#define PR_SET_FPEMU 10
29# define PR_FPEMU_NOPRINT 1 /* silently emulate fp operations accesses */
30# define PR_FPEMU_SIGFPE 2 /* don't emulate fp operations, send SIGFPE instead */
31
32/* Get/set floating-point exception mode (if meaningful) */
33#define PR_GET_FPEXC 11
34#define PR_SET_FPEXC 12
35# define PR_FP_EXC_SW_ENABLE 0x80 /* Use FPEXC for FP exception enables */
36# define PR_FP_EXC_DIV 0x010000 /* floating point divide by zero */
37# define PR_FP_EXC_OVF 0x020000 /* floating point overflow */
38# define PR_FP_EXC_UND 0x040000 /* floating point underflow */
39# define PR_FP_EXC_RES 0x080000 /* floating point inexact result */
40# define PR_FP_EXC_INV 0x100000 /* floating point invalid operation */
41# define PR_FP_EXC_DISABLED 0 /* FP exceptions disabled */
42# define PR_FP_EXC_NONRECOV 1 /* async non-recoverable exc. mode */
43# define PR_FP_EXC_ASYNC 2 /* async recoverable exception mode */
44# define PR_FP_EXC_PRECISE 3 /* precise exception mode */
45
46/* Get/set whether we use statistical process timing or accurate timestamp
47 * based process timing */
48#define PR_GET_TIMING 13
49#define PR_SET_TIMING 14
50# define PR_TIMING_STATISTICAL 0 /* Normal, traditional,
51 statistical process timing */
52# define PR_TIMING_TIMESTAMP 1 /* Accurate timestamp based
53 process timing */
54
55#define PR_SET_NAME 15 /* Set process name */
56#define PR_GET_NAME 16 /* Get process name */
57
651d765d
AB
58/* Get/set process endian */
59#define PR_GET_ENDIAN 19
60#define PR_SET_ENDIAN 20
61# define PR_ENDIAN_BIG 0
62# define PR_ENDIAN_LITTLE 1 /* True little endian mode */
63# define PR_ENDIAN_PPC_LITTLE 2 /* "PowerPC" pseudo little endian */
64
1d9d02fe
AA
65/* Get/set process seccomp mode */
66#define PR_GET_SECCOMP 21
67#define PR_SET_SECCOMP 22
68
3898b1b4 69/* Get/set the capability bounding set (as per security/commoncap.c) */
3b7391de
SH
70#define PR_CAPBSET_READ 23
71#define PR_CAPBSET_DROP 24
72
8fb402bc
EB
73/* Get/set the process' ability to use the timestamp counter instruction */
74#define PR_GET_TSC 25
75#define PR_SET_TSC 26
76# define PR_TSC_ENABLE 1 /* allow the use of the timestamp counter */
77# define PR_TSC_SIGSEGV 2 /* throw a SIGSEGV instead of reading the TSC */
78
3898b1b4
AM
79/* Get/set securebits (as per security/commoncap.c) */
80#define PR_GET_SECUREBITS 27
81#define PR_SET_SECUREBITS 28
82
6976675d
AV
83/*
84 * Get/set the timerslack as used by poll/select/nanosleep
85 * A value of 0 means "use default"
86 */
87#define PR_SET_TIMERSLACK 29
88#define PR_GET_TIMERSLACK 30
89
cdd6c482
IM
90#define PR_TASK_PERF_EVENTS_DISABLE 31
91#define PR_TASK_PERF_EVENTS_ENABLE 32
1d1c7ddb 92
1087e9b4
AK
93/*
94 * Set early/late kill mode for hwpoison memory corruption.
95 * This influences when the process gets killed on a memory corruption.
96 */
4db96cf0 97#define PR_MCE_KILL 33
1087e9b4
AK
98# define PR_MCE_KILL_CLEAR 0
99# define PR_MCE_KILL_SET 1
100
101# define PR_MCE_KILL_LATE 0
102# define PR_MCE_KILL_EARLY 1
103# define PR_MCE_KILL_DEFAULT 2
104
105#define PR_MCE_KILL_GET 34
4db96cf0 106
028ee4be
CG
107/*
108 * Tune up process memory map specifics.
109 */
110#define PR_SET_MM 35
111# define PR_SET_MM_START_CODE 1
112# define PR_SET_MM_END_CODE 2
113# define PR_SET_MM_START_DATA 3
114# define PR_SET_MM_END_DATA 4
115# define PR_SET_MM_START_STACK 5
116# define PR_SET_MM_START_BRK 6
117# define PR_SET_MM_BRK 7
fe8c7f5c
CG
118# define PR_SET_MM_ARG_START 8
119# define PR_SET_MM_ARG_END 9
120# define PR_SET_MM_ENV_START 10
121# define PR_SET_MM_ENV_END 11
122# define PR_SET_MM_AUXV 12
b32dfe37 123# define PR_SET_MM_EXE_FILE 13
f606b77f
CG
124# define PR_SET_MM_MAP 14
125# define PR_SET_MM_MAP_SIZE 15
126
127/*
128 * This structure provides new memory descriptor
129 * map which mostly modifies /proc/pid/stat[m]
130 * output for a task. This mostly done in a
131 * sake of checkpoint/restore functionality.
132 */
133struct prctl_mm_map {
134 __u64 start_code; /* code section bounds */
135 __u64 end_code;
136 __u64 start_data; /* data section bounds */
137 __u64 end_data;
138 __u64 start_brk; /* heap for brk() syscall */
139 __u64 brk;
140 __u64 start_stack; /* stack starts at */
141 __u64 arg_start; /* command line arguments bounds */
142 __u64 arg_end;
143 __u64 env_start; /* environment variables bounds */
144 __u64 env_end;
145 __u64 *auxv; /* auxiliary vector */
146 __u32 auxv_size; /* vector size */
147 __u32 exe_fd; /* /proc/$pid/exe link file */
148};
028ee4be 149
2d514487
KC
150/*
151 * Set specific pid that is allowed to ptrace the current task.
152 * A value of 0 mean "no process".
153 */
154#define PR_SET_PTRACER 0x59616d61
bf06189e 155# define PR_SET_PTRACER_ANY ((unsigned long)-1)
2d514487 156
300f786b
CG
157#define PR_SET_CHILD_SUBREAPER 36
158#define PR_GET_CHILD_SUBREAPER 37
ebec18a6 159
259e5e6c
AL
160/*
161 * If no_new_privs is set, then operations that grant new privileges (i.e.
162 * execve) will either fail or not grant them. This affects suid/sgid,
163 * file capabilities, and LSMs.
164 *
165 * Operations that merely manipulate or drop existing privileges (setresuid,
166 * capset, etc.) will still work. Drop those privileges if you want them gone.
167 *
168 * Changing LSM security domain is considered a new privilege. So, for example,
169 * asking selinux for a specific new context (e.g. with runcon) will result
170 * in execve returning -EPERM.
c540521b
AL
171 *
172 * See Documentation/prctl/no_new_privs.txt for more details.
259e5e6c 173 */
300f786b
CG
174#define PR_SET_NO_NEW_PRIVS 38
175#define PR_GET_NO_NEW_PRIVS 39
176
177#define PR_GET_TID_ADDRESS 40
259e5e6c 178
a0715cc2
AT
179#define PR_SET_THP_DISABLE 41
180#define PR_GET_THP_DISABLE 42
181
fe3d197f
DH
182/*
183 * Tell the kernel to start/stop helping userspace manage bounds tables.
184 */
185#define PR_MPX_ENABLE_MANAGEMENT 43
186#define PR_MPX_DISABLE_MANAGEMENT 44
187
9791554b
PB
188#define PR_SET_FP_MODE 45
189#define PR_GET_FP_MODE 46
190# define PR_FP_MODE_FR (1 << 0) /* 64b FP registers */
191# define PR_FP_MODE_FRE (1 << 1) /* 32b compatibility */
192
58319057
AL
193/* Control the ambient capability set */
194#define PR_CAP_AMBIENT 47
195# define PR_CAP_AMBIENT_IS_SET 1
196# define PR_CAP_AMBIENT_RAISE 2
197# define PR_CAP_AMBIENT_LOWER 3
198# define PR_CAP_AMBIENT_CLEAR_ALL 4
199
f12a33c4
TG
200/* Per task speculation control */
201#define PR_GET_SPECULATION_CTRL 52
202#define PR_SET_SPECULATION_CTRL 53
203/* Speculation control variants */
204# define PR_SPEC_STORE_BYPASS 0
205/* Return and control values for PR_SET/GET_SPECULATION_CTRL */
206# define PR_SPEC_NOT_AFFECTED 0
207# define PR_SPEC_PRCTL (1UL << 0)
208# define PR_SPEC_ENABLE (1UL << 1)
209# define PR_SPEC_DISABLE (1UL << 2)
e29928d4 210# define PR_SPEC_FORCE_DISABLE (1UL << 3)
f12a33c4 211
ab5e2f3f 212/*
99c55932
TH
213 * Control the LSM specific peer information
214 *
215 * The Ubuntu kernel provides an early preview of LSM Stacking. Use these
216 * PRCTLs at your own risk. Their values are not guaranteed to be stable in the
217 * case of colliding with an upstream PRCTL.
ab5e2f3f 218 */
99c55932
TH
219#define PR_GET_DISPLAY_LSM 1000000
220#define PR_SET_DISPLAY_LSM 1000001
221
1da177e4 222#endif /* _LINUX_PRCTL_H */