Lines Matching refs:current

72 	struct task_struct *task = current;  in populate_seccomp_data()
182 lockless_dereference(current->seccomp.filter); in seccomp_run_filters()
209 assert_spin_locked(&current->sighand->siglock); in seccomp_may_assign_mode()
211 if (current->seccomp.mode && current->seccomp.mode != seccomp_mode) in seccomp_may_assign_mode()
258 BUG_ON(!mutex_is_locked(&current->signal->cred_guard_mutex)); in seccomp_can_sync_threads()
259 assert_spin_locked(&current->sighand->siglock); in seccomp_can_sync_threads()
262 caller = current; in seccomp_can_sync_threads()
299 BUG_ON(!mutex_is_locked(&current->signal->cred_guard_mutex)); in seccomp_sync_threads()
300 assert_spin_locked(&current->sighand->siglock); in seccomp_sync_threads()
303 caller = current; in seccomp_sync_threads()
363 if (!task_no_new_privs(current) && in seccomp_prepare_filter()
428 assert_spin_locked(&current->sighand->siglock); in seccomp_attach_filter()
432 for (walker = current->seccomp.filter; walker; walker = walker->prev) in seccomp_attach_filter()
450 filter->prev = current->seccomp.filter; in seccomp_attach_filter()
451 current->seccomp.filter = filter; in seccomp_attach_filter()
503 info.si_call_addr = (void __user *)KSTK_EIP(current); in seccomp_send_sigsys()
507 force_sig_info(SIGSYS, &info, current); in seccomp_send_sigsys()
550 int mode = current->seccomp.mode; in secure_computing_strict()
553 unlikely(current->ptrace & PT_SUSPEND_SECCOMP)) in secure_computing_strict()
597 syscall_set_return_value(current, task_pt_regs(current), in __seccomp_phase1_filter()
603 syscall_rollback(current, task_pt_regs(current)); in __seccomp_phase1_filter()
653 int mode = current->seccomp.mode; in seccomp_phase1()
655 syscall_get_nr(current, task_pt_regs(current)); in seccomp_phase1()
658 unlikely(current->ptrace & PT_SUSPEND_SECCOMP)) in seccomp_phase1()
684 struct pt_regs *regs = task_pt_regs(current); in seccomp_phase2()
690 audit_seccomp(syscall_get_nr(current, regs), 0, action); in seccomp_phase2()
693 if (!ptrace_event_enabled(current, PTRACE_EVENT_SECCOMP)) { in seccomp_phase2()
694 syscall_set_return_value(current, regs, in seccomp_phase2()
707 if (fatal_signal_pending(current)) in seccomp_phase2()
709 if (syscall_get_nr(current, regs) < 0) in seccomp_phase2()
718 return current->seccomp.mode; in prctl_get_seccomp()
733 spin_lock_irq(&current->sighand->siglock); in seccomp_set_mode_strict()
741 seccomp_assign_mode(current, seccomp_mode); in seccomp_set_mode_strict()
745 spin_unlock_irq(&current->sighand->siglock); in seccomp_set_mode_strict()
785 mutex_lock_killable(&current->signal->cred_guard_mutex)) in seccomp_set_mode_filter()
788 spin_lock_irq(&current->sighand->siglock); in seccomp_set_mode_filter()
799 seccomp_assign_mode(current, seccomp_mode); in seccomp_set_mode_filter()
801 spin_unlock_irq(&current->sighand->siglock); in seccomp_set_mode_filter()
803 mutex_unlock(&current->signal->cred_guard_mutex); in seccomp_set_mode_filter()
882 current->seccomp.mode != SECCOMP_MODE_DISABLED) { in seccomp_get_filter()