Lines Matching refs:current
80 struct task_struct *task = current; in populate_seccomp_data()
195 READ_ONCE(current->seccomp.filter); in seccomp_run_filters()
224 assert_spin_locked(¤t->sighand->siglock); in seccomp_may_assign_mode()
226 if (current->seccomp.mode && current->seccomp.mode != seccomp_mode) in seccomp_may_assign_mode()
279 BUG_ON(!mutex_is_locked(¤t->signal->cred_guard_mutex)); in seccomp_can_sync_threads()
280 assert_spin_locked(¤t->sighand->siglock); in seccomp_can_sync_threads()
283 caller = current; in seccomp_can_sync_threads()
320 BUG_ON(!mutex_is_locked(¤t->signal->cred_guard_mutex)); in seccomp_sync_threads()
321 assert_spin_locked(¤t->sighand->siglock); in seccomp_sync_threads()
324 caller = current; in seccomp_sync_threads()
385 if (!task_no_new_privs(current) && in seccomp_prepare_filter()
450 assert_spin_locked(¤t->sighand->siglock); in seccomp_attach_filter()
454 for (walker = current->seccomp.filter; walker; walker = walker->prev) in seccomp_attach_filter()
476 filter->prev = current->seccomp.filter; in seccomp_attach_filter()
477 current->seccomp.filter = filter; in seccomp_attach_filter()
530 info->si_call_addr = (void __user *)KSTK_EIP(current); in seccomp_init_siginfo()
547 force_sig_info(SIGSYS, &info, current); in seccomp_send_sigsys()
639 int mode = current->seccomp.mode; in secure_computing_strict()
642 unlikely(current->ptrace & PT_SUSPEND_SECCOMP)) in secure_computing_strict()
677 syscall_set_return_value(current, task_pt_regs(current), in __seccomp_filter()
683 syscall_rollback(current, task_pt_regs(current)); in __seccomp_filter()
694 if (!ptrace_event_enabled(current, PTRACE_EVENT_SECCOMP)) { in __seccomp_filter()
695 syscall_set_return_value(current, in __seccomp_filter()
696 task_pt_regs(current), in __seccomp_filter()
713 if (fatal_signal_pending(current)) in __seccomp_filter()
716 this_syscall = syscall_get_nr(current, task_pt_regs(current)); in __seccomp_filter()
749 get_nr_threads(current) == 1) { in __seccomp_filter()
753 syscall_rollback(current, task_pt_regs(current)); in __seccomp_filter()
780 int mode = current->seccomp.mode; in __secure_computing()
784 unlikely(current->ptrace & PT_SUSPEND_SECCOMP)) in __secure_computing()
788 syscall_get_nr(current, task_pt_regs(current)); in __secure_computing()
804 return current->seccomp.mode; in prctl_get_seccomp()
819 spin_lock_irq(¤t->sighand->siglock); in seccomp_set_mode_strict()
827 seccomp_assign_mode(current, seccomp_mode, 0); in seccomp_set_mode_strict()
831 spin_unlock_irq(¤t->sighand->siglock); in seccomp_set_mode_strict()
871 mutex_lock_killable(¤t->signal->cred_guard_mutex)) in seccomp_set_mode_filter()
874 spin_lock_irq(¤t->sighand->siglock); in seccomp_set_mode_filter()
885 seccomp_assign_mode(current, seccomp_mode, flags); in seccomp_set_mode_filter()
887 spin_unlock_irq(¤t->sighand->siglock); in seccomp_set_mode_filter()
889 mutex_unlock(¤t->signal->cred_guard_mutex); in seccomp_set_mode_filter()
1041 current->seccomp.mode != SECCOMP_MODE_DISABLED) { in seccomp_get_filter()
1079 current->seccomp.mode != SECCOMP_MODE_DISABLED) { in seccomp_get_metadata()