osid              303 arch/parisc/kernel/setup.c 	u32 osid = (OS_ID_LINUX << 16);
osid              315 arch/parisc/kernel/setup.c 	pdc_stable_write(0x40, &osid, sizeof(osid));
osid              925 drivers/parisc/pdc_stable.c static PDCS_ATTR(osid, 0444, pdcs_osid_read, NULL);
osid              170 fs/cifs/cifsglob.h 	struct cifs_sid osid;
osid               80 kernel/audit.h 	u32			osid;
osid              154 kernel/audit.h 			u32			osid;
osid              662 kernel/auditsc.c 								name->osid,
osid              669 kernel/auditsc.c 								n->osid,
osid              681 kernel/auditsc.c 				if (security_audit_rule_match(ctx->ipc.osid,
osid             1206 kernel/auditsc.c 		u32 osid = context->ipc.osid;
osid             1212 kernel/auditsc.c 		if (osid) {
osid             1215 kernel/auditsc.c 			if (security_secid_to_secctx(osid, &ctx, &len)) {
osid             1216 kernel/auditsc.c 				audit_log_format(ab, " osid=%u", osid);
osid             1362 kernel/auditsc.c 	if (n->osid != 0) {
osid             1367 kernel/auditsc.c 			n->osid, &ctx, &len)) {
osid             1368 kernel/auditsc.c 			audit_log_format(ab, " osid=%u", n->osid);
osid             1930 kernel/auditsc.c 	security_inode_getsecid(inode, &name->osid);
osid             2280 kernel/auditsc.c 	security_ipc_getsecid(ipcp, &context->ipc.osid);
osid              415 security/integrity/ima/ima_policy.c 		u32 osid;
osid              427 security/integrity/ima/ima_policy.c 			security_inode_getsecid(inode, &osid);
osid              428 security/integrity/ima/ima_policy.c 			rc = security_filter_rule_match(osid,
osid              214 security/selinux/hooks.c 	tsec->osid = tsec->sid = SECINITSID_KERNEL;
osid             2349 security/selinux/hooks.c 	new_tsec->osid = old_tsec->sid;
osid             2509 security/selinux/hooks.c 	if (new_tsec->sid == new_tsec->osid)
osid             2529 security/selinux/hooks.c 			  new_tsec->osid, new_tsec->sid, SECCLASS_PROCESS,
osid             2553 security/selinux/hooks.c 	u32 osid, sid;
osid             2556 security/selinux/hooks.c 	osid = tsec->osid;
osid             2559 security/selinux/hooks.c 	if (sid == osid)
osid             2570 security/selinux/hooks.c 			  osid, sid, SECCLASS_PROCESS, PROCESS__SIGINH, NULL);
osid             6316 security/selinux/hooks.c 		sid = __tsec->osid;
osid               32 security/selinux/include/objsec.h 	u32 osid;		/* SID prior to last execve */
osid              689 security/selinux/selinuxfs.c 	u32 osid, nsid, tsid;
osid              732 security/selinux/selinuxfs.c 	rc = security_context_str_to_sid(state, oldcon, &osid, GFP_KERNEL);
osid              744 security/selinux/selinuxfs.c 	rc = security_validate_transition_user(state, osid, nsid, tsid, tclass);