Lines Matching refs:state
2150 struct selinux_state *state = &selinux_state;
2153 oldpolicy = rcu_dereference_protected(state->policy,
2154 lockdep_is_held(&state->policy_mutex));
2174 struct selinux_state *state = &selinux_state;
2179 oldpolicy = rcu_dereference_protected(state->policy,
2180 lockdep_is_held(&state->policy_mutex));
2200 rcu_assign_pointer(state->policy, newpolicy);
2203 rcu_assign_pointer(state->policy, newpolicy);
2232 * @load_state: policy load state
2242 struct selinux_state *state = &selinux_state;
2275 /* First policy load, so no need to preserve state from old policy */
2281 oldpolicy = rcu_dereference_protected(state->policy,
2282 lockdep_is_held(&state->policy_mutex));
2990 (*values)[i] = policydb->bool_val_to_struct[i]->state;
3017 struct selinux_state *state = &selinux_state;
3025 oldpolicy = rcu_dereference_protected(state->policy,
3026 lockdep_is_held(&state->policy_mutex));
3049 int old_state = newpolicy->policydb.bool_val_to_struct[i]->state;
3060 newpolicy->policydb.bool_val_to_struct[i]->state = new_state;
3072 rcu_assign_pointer(state->policy, newpolicy);
3106 rc = policydb->bool_val_to_struct[index]->state;
3127 booldatum->state = bvalues[i];
3293 * security server was initialized and state->initialized was true.
3502 struct selinux_state *state = &selinux_state;
3547 policy = rcu_dereference(state->policy);
3627 struct selinux_state *state = &selinux_state;
3644 policy = rcu_dereference(state->policy);
3948 struct selinux_state *state = &selinux_state;
3952 state->policy, lockdep_is_held(&state->policy_mutex));
3978 struct selinux_state *state = &selinux_state;
3982 state->policy, lockdep_is_held(&state->policy_mutex));