{
size_t len;
+ if (!selinux_initialized(state))
+ return 0;
+
read_lock(&state->ss->policy_rwlock);
len = state->ss->policy->policydb.len;
read_unlock(&state->ss->policy_rwlock);
struct ocontext *c;
int rc = 0;
+ if (!selinux_initialized(state)) {
+ *out_sid = SECINITSID_PORT;
+ return 0;
+ }
+
read_lock(&state->ss->policy_rwlock);
policydb = &state->ss->policy->policydb;
struct ocontext *c;
int rc = 0;
+ if (!selinux_initialized(state)) {
+ *out_sid = SECINITSID_UNLABELED;
+ return 0;
+ }
+
read_lock(&state->ss->policy_rwlock);
policydb = &state->ss->policy->policydb;
struct ocontext *c;
int rc = 0;
+ if (!selinux_initialized(state)) {
+ *out_sid = SECINITSID_UNLABELED;
+ return 0;
+ }
+
read_lock(&state->ss->policy_rwlock);
policydb = &state->ss->policy->policydb;
int rc = 0;
struct ocontext *c;
+ if (!selinux_initialized(state)) {
+ *if_sid = SECINITSID_NETIF;
+ return 0;
+ }
+
read_lock(&state->ss->policy_rwlock);
policydb = &state->ss->policy->policydb;
int rc;
struct ocontext *c;
+ if (!selinux_initialized(state)) {
+ *out_sid = SECINITSID_NODE;
+ return 0;
+ }
+
read_lock(&state->ss->policy_rwlock);
policydb = &state->ss->policy->policydb;
{
int retval;
+ if (!selinux_initialized(state)) {
+ *sid = SECINITSID_UNLABELED;
+ return 0;
+ }
+
read_lock(&state->ss->policy_rwlock);
retval = __security_genfs_sid(state->ss->policy,
fstype, path, orig_sclass, sid);
struct superblock_security_struct *sbsec = sb->s_security;
const char *fstype = sb->s_type->name;
+ if (!selinux_initialized(state)) {
+ sbsec->behavior = SECURITY_FS_USE_NONE;
+ sbsec->sid = SECINITSID_UNLABELED;
+ return 0;
+ }
+
read_lock(&state->ss->policy_rwlock);
policydb = &state->ss->policy->policydb;
int rc;
u32 i, seqno = 0;
+ if (!selinux_initialized(state))
+ return -EINVAL;
+
/*
* NOTE: We do not need to take the policy read-lock
* around the code below because other policy-modifying
int rc;
u32 len;
+ if (!selinux_initialized(state))
+ return 0;
+
read_lock(&state->ss->policy_rwlock);
policydb = &state->ss->policy->policydb;
return 0;
}
+ if (!selinux_initialized(state))
+ return 0;
+
read_lock(&state->ss->policy_rwlock);
policydb = &state->ss->policy->policydb;
{
int value;
+ if (!selinux_initialized(state))
+ return 0;
+
read_lock(&state->ss->policy_rwlock);
value = state->ss->policy->policydb.reject_unknown;
read_unlock(&state->ss->policy_rwlock);
{
int value;
+ if (!selinux_initialized(state))
+ return 0;
+
read_lock(&state->ss->policy_rwlock);
value = state->ss->policy->policydb.allow_unknown;
read_unlock(&state->ss->policy_rwlock);
{
int rc;
+ if (!selinux_initialized(state))
+ return 0;
+
read_lock(&state->ss->policy_rwlock);
rc = ebitmap_get_bit(&state->ss->policy->policydb.policycaps, req_cap);
read_unlock(&state->ss->policy_rwlock);
return -ENOENT;
}
+ if (!selinux_initialized(state))
+ return 0;
+
read_lock(&state->ss->policy_rwlock);
if (rule->au_seqno < state->ss->latest_granting) {