/kernel/linux/linux-5.10/arch/parisc/kernel/ |
H A D | setup.c | 299 u32 osid = (OS_ID_LINUX << 16); in parisc_init() local 311 pdc_stable_write(0x40, &osid, sizeof(osid)); in parisc_init()
|
/kernel/linux/linux-6.6/arch/parisc/kernel/ |
H A D | setup.c | 240 u32 osid = (OS_ID_LINUX << 16); in parisc_init() local 251 pdc_stable_write(0x40, &osid, sizeof(osid)); in parisc_init()
|
/kernel/linux/linux-5.10/fs/cifs/ |
H A D | cifsacl.c | 1046 struct owner_sid *osid = (struct owner_sid *)nowner_sid_ptr; in build_sec_desc() local 1048 osid->Revision = 1; in build_sec_desc() 1049 osid->NumAuth = 3; in build_sec_desc() 1050 osid->Authority[5] = 5; in build_sec_desc() 1051 osid->SubAuthorities[0] = cpu_to_le32(88); in build_sec_desc() 1052 osid->SubAuthorities[1] = cpu_to_le32(1); in build_sec_desc() 1053 osid->SubAuthorities[2] = cpu_to_le32(id); in build_sec_desc()
|
H A D | cifsglob.h | 173 struct cifs_sid osid; member
|
/kernel/linux/linux-5.10/kernel/ |
H A D | auditsc.c | 691 name->osid, in audit_filter_rules() 698 n->osid, in audit_filter_rules() 710 if (security_audit_rule_match(ctx->ipc.osid, in audit_filter_rules() 1282 u32 osid = context->ipc.osid; in show_special() local 1288 if (osid) { in show_special() 1291 if (security_secid_to_secctx(osid, &ctx, &len)) { in show_special() 1292 audit_log_format(ab, " osid=%u", osid); in show_special() 1443 if (n->osid ! in audit_log_name() [all...] |
H A D | audit.h | 80 u32 osid; member 154 u32 osid; member
|
/kernel/linux/linux-6.6/kernel/ |
H A D | auditsc.c | 700 name->osid, in audit_filter_rules() 707 n->osid, in audit_filter_rules() 719 if (security_audit_rule_match(ctx->ipc.osid, in audit_filter_rules() 1388 u32 osid = context->ipc.osid; in show_special() local 1394 if (osid) { in show_special() 1398 if (security_secid_to_secctx(osid, &ctx, &len)) { in show_special() 1399 audit_log_format(ab, " osid=%u", osid); in show_special() 1561 if (n->osid ! in audit_log_name() [all...] |
H A D | audit.h | 84 u32 osid; member 163 u32 osid; member
|
/kernel/linux/linux-5.10/security/selinux/include/ |
H A D | objsec.h | 32 u32 osid; /* SID prior to last execve */ member
|
/kernel/linux/linux-6.6/security/selinux/include/ |
H A D | objsec.h | 32 u32 osid; /* SID prior to last execve */ member
|
/kernel/linux/linux-6.6/fs/smb/client/ |
H A D | cifsacl.c | 1316 struct owner_sid *osid = (struct owner_sid *)nowner_sid_ptr; in build_sec_desc() local 1318 osid->Revision = 1; in build_sec_desc() 1319 osid->NumAuth = 3; in build_sec_desc() 1320 osid->Authority[5] = 5; in build_sec_desc() 1321 osid->SubAuthorities[0] = cpu_to_le32(88); in build_sec_desc() 1322 osid->SubAuthorities[1] = cpu_to_le32(1); in build_sec_desc() 1323 osid->SubAuthorities[2] = cpu_to_le32(id); in build_sec_desc()
|
H A D | cifsglob.h | 182 struct cifs_sid osid; member
|
/kernel/linux/linux-5.10/security/integrity/ima/ |
H A D | ima_policy.c | 545 u32 osid; in ima_match_rules() local 559 security_inode_getsecid(inode, &osid); in ima_match_rules() 560 rc = ima_filter_rule_match(osid, lsm_rule->lsm[i].type, in ima_match_rules()
|
/kernel/linux/linux-5.10/security/selinux/ |
H A D | selinuxfs.c | 782 u32 osid, nsid, tsid; in sel_write_validatetrans() local 825 rc = security_context_str_to_sid(state, oldcon, &osid, GFP_KERNEL); in sel_write_validatetrans() 837 rc = security_validate_transition_user(state, osid, nsid, tsid, tclass); in sel_write_validatetrans()
|
H A D | hooks.c | 220 tsec->osid = tsec->sid = SECINITSID_KERNEL; in cred_init_security() 2320 new_tsec->osid = old_tsec->sid; in selinux_bprm_creds_for_exec() 2480 if (new_tsec->sid == new_tsec->osid) in selinux_bprm_committing_creds() 2500 new_tsec->osid, new_tsec->sid, SECCLASS_PROCESS, in selinux_bprm_committing_creds() 2523 u32 osid, sid; in selinux_bprm_committed_creds() local 2526 osid = tsec->osid; in selinux_bprm_committed_creds() 2529 if (sid == osid) in selinux_bprm_committed_creds() 2540 osid, sid, SECCLASS_PROCESS, PROCESS__SIGINH, NULL); in selinux_bprm_committed_creds() 6358 sid = __tsec->osid; in selinux_getprocattr() [all...] |
/kernel/linux/linux-6.6/security/integrity/ima/ |
H A D | ima_policy.c | 636 u32 osid; in ima_match_rules() local 650 security_inode_getsecid(inode, &osid); in ima_match_rules() 651 rc = ima_filter_rule_match(osid, lsm_rule->lsm[i].type, in ima_match_rules()
|
/kernel/linux/linux-6.6/security/selinux/ |
H A D | selinuxfs.c | 743 u32 osid, nsid, tsid; in sel_write_validatetrans() local 785 rc = security_context_str_to_sid(oldcon, &osid, GFP_KERNEL); in sel_write_validatetrans() 797 rc = security_validate_transition_user(osid, nsid, tsid, tclass); in sel_write_validatetrans()
|
H A D | hooks.c | 216 tsec->osid = tsec->sid = SECINITSID_KERNEL; in cred_init_security() 2310 new_tsec->osid = old_tsec->sid; in selinux_bprm_creds_for_exec() 2464 if (new_tsec->sid == new_tsec->osid) in selinux_bprm_committing_creds() 2483 rc = avc_has_perm(new_tsec->osid, new_tsec->sid, SECCLASS_PROCESS, in selinux_bprm_committing_creds() 2506 u32 osid, sid; in selinux_bprm_committed_creds() local 2509 osid = tsec->osid; in selinux_bprm_committed_creds() 2512 if (sid == osid) in selinux_bprm_committed_creds() 2522 rc = avc_has_perm(osid, sid, SECCLASS_PROCESS, PROCESS__SIGINH, NULL); in selinux_bprm_committed_creds() 6337 sid = __tsec->osid; in selinux_getprocattr() [all...] |
/kernel/linux/linux-5.10/drivers/parisc/ |
H A D | pdc_stable.c | 925 static PDCS_ATTR(osid, 0444, pdcs_osid_read, NULL);
|
/kernel/linux/linux-6.6/drivers/parisc/ |
H A D | pdc_stable.c | 953 static PDCS_ATTR(osid, 0444, pdcs_osid_read, NULL);
|