Lines Matching refs:seccomp
178 struct seccomp_filter *f = ACCESS_ONCE(current->seccomp.filter); in seccomp_run_filters()
212 if (current->seccomp.mode && current->seccomp.mode != seccomp_mode) in seccomp_may_assign_mode()
223 task->seccomp.mode = seccomp_mode; in seccomp_assign_mode()
271 if (thread->seccomp.mode == SECCOMP_MODE_DISABLED || in seccomp_can_sync_threads()
272 (thread->seccomp.mode == SECCOMP_MODE_FILTER && in seccomp_can_sync_threads()
273 is_ancestor(thread->seccomp.filter, in seccomp_can_sync_threads()
274 caller->seccomp.filter))) in seccomp_can_sync_threads()
318 smp_store_release(&thread->seccomp.filter, in seccomp_sync_threads()
319 caller->seccomp.filter); in seccomp_sync_threads()
336 if (thread->seccomp.mode == SECCOMP_MODE_DISABLED) in seccomp_sync_threads()
474 for (walker = current->seccomp.filter; walker; walker = walker->prev) in seccomp_attach_filter()
492 filter->prev = current->seccomp.filter; in seccomp_attach_filter()
493 current->seccomp.filter = filter; in seccomp_attach_filter()
505 struct seccomp_filter *orig = tsk->seccomp.filter; in get_seccomp_filter()
523 struct seccomp_filter *orig = tsk->seccomp.filter; in put_seccomp_filter()
592 int mode = current->seccomp.mode; in secure_computing_strict()
691 int mode = current->seccomp.mode; in seccomp_phase1()
752 return current->seccomp.mode; in prctl_get_seccomp()
866 SYSCALL_DEFINE3(seccomp, unsigned int, op, unsigned int, flags, in SYSCALL_DEFINE3() argument