#ifndef _LINUX_SECUREBITS_H#define _LINUX_SECUREBITS_H 1#define SECUREBITS_DEFAULT 0x00000000externunsignedsecurebits;/* When set UID 0 has no special privileges. When unset, we support inheritance of root-permissions and suid-root executable under compatibility mode. We raise the effective and inheritable bitmasks *of the executable file* if the effective uid of the new process is 0. If the real uid is 0, we raise the inheritable bitmask of the executable file. */#define SECURE_NOROOT 0/* When set, setuid to/from uid 0 does not trigger capability-"fixes" to be compatible with old programs relying on set*uid to loose privileges. When unset, setuid doesn't change privileges. */#define SECURE_NO_SETUID_FIXUP 2/* Each securesetting is implemented using two bits. One bit specify whether the setting is on or off. The other bit specify whether the setting is fixed or not. A setting which is fixed cannot be changed from user-level. */#define issecure(X) ( (1 << (X+1)) & SECUREBITS_DEFAULT ? \ (1 << (X)) & SECUREBITS_DEFAULT : \ (1 << (X)) & securebits )#endif /* !_LINUX_SECUREBITS_H */