Viewing file: securebits.h (1.15 KB) -rw-r--r-- Select action/file-type: (+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
#ifndef _LINUX_SECUREBITS_H #define _LINUX_SECUREBITS_H 1
#define SECUREBITS_DEFAULT 0x00000000
extern unsigned securebits;
/* When set UID 0 has no special privileges. When unset, we support inheritance of root-permissions and suid-root executablew under compatibility mode. We raise the effective and inheritable bitmasks *of the executable file* if the effective uid of the new process is 0. If the real uid is 0, we raise the inheritable bitmask of the executable file. */ #define SECURE_NOROOT 0
/* When set, setuid to/from uid 0 does not trigger capability-"fixes" to be compatible with old programs relying on set*uid to loose privileges. When unset, setuid doesn't change privileges. */ #define SECURE_NO_SETUID_FIXUP 2
/* Each securesetting is implemented using two bits. One bit specify whether the setting is on or off. The other bit specify whether the setting is fixed or not. A setting which is fixed cannot be changed from user-level. */
#define issecure(X) ( (1 << (X+1)) & SECUREBITS_DEFAULT ? \ (1 << (X)) & SECUREBITS_DEFAULT : \ (1 << (X)) & securebits )
#endif /* !_LINUX_SECUREBITS_H */
|