Lines Matching refs:newpolicy
2171 struct selinux_policy *newpolicy);
2218 struct selinux_policy *oldpolicy, *newpolicy = load_state->policy; in selinux_policy_commit() local
2227 if (oldpolicy->policydb.mls_enabled && !newpolicy->policydb.mls_enabled) in selinux_policy_commit()
2229 else if (!oldpolicy->policydb.mls_enabled && newpolicy->policydb.mls_enabled) in selinux_policy_commit()
2235 newpolicy->latest_granting = oldpolicy->latest_granting + 1; in selinux_policy_commit()
2237 newpolicy->latest_granting = 1; in selinux_policy_commit()
2238 seqno = newpolicy->latest_granting; in selinux_policy_commit()
2243 rcu_assign_pointer(state->policy, newpolicy); in selinux_policy_commit()
2246 rcu_assign_pointer(state->policy, newpolicy); in selinux_policy_commit()
2250 security_load_policycaps(state, newpolicy); in selinux_policy_commit()
2285 struct selinux_policy *newpolicy, *oldpolicy; in security_load_policy() local
2290 newpolicy = kzalloc(sizeof(*newpolicy), GFP_KERNEL); in security_load_policy()
2291 if (!newpolicy) in security_load_policy()
2294 newpolicy->sidtab = kzalloc(sizeof(*newpolicy->sidtab), GFP_KERNEL); in security_load_policy()
2295 if (!newpolicy->sidtab) { in security_load_policy()
2300 rc = policydb_read(&newpolicy->policydb, fp); in security_load_policy()
2304 newpolicy->policydb.len = len; in security_load_policy()
2305 rc = selinux_set_mapping(&newpolicy->policydb, secclass_map, in security_load_policy()
2306 &newpolicy->map); in security_load_policy()
2310 rc = policydb_load_isids(&newpolicy->policydb, newpolicy->sidtab); in security_load_policy()
2318 load_state->policy = newpolicy; in security_load_policy()
2327 rc = security_preserve_bools(oldpolicy, newpolicy); in security_load_policy()
2345 convert_data->args.newp = &newpolicy->policydb; in security_load_policy()
2349 convert_data->sidtab_params.target = newpolicy->sidtab; in security_load_policy()
2359 load_state->policy = newpolicy; in security_load_policy()
2366 sidtab_destroy(newpolicy->sidtab); in security_load_policy()
2368 kfree(newpolicy->map.mapping); in security_load_policy()
2370 policydb_destroy(&newpolicy->policydb); in security_load_policy()
2372 kfree(newpolicy->sidtab); in security_load_policy()
2374 kfree(newpolicy); in security_load_policy()
3069 struct selinux_policy *newpolicy, *oldpolicy; in security_set_bools() local
3083 newpolicy = kmemdup(oldpolicy, sizeof(*newpolicy), GFP_KERNEL); in security_set_bools()
3084 if (!newpolicy) in security_set_bools()
3091 rc = cond_policydb_dup(&newpolicy->policydb, &oldpolicy->policydb); in security_set_bools()
3093 kfree(newpolicy); in security_set_bools()
3100 int old_state = newpolicy->policydb.bool_val_to_struct[i]->state; in security_set_bools()
3106 sym_name(&newpolicy->policydb, SYM_BOOLS, i), in security_set_bools()
3111 newpolicy->policydb.bool_val_to_struct[i]->state = new_state; in security_set_bools()
3116 evaluate_cond_nodes(&newpolicy->policydb); in security_set_bools()
3119 newpolicy->latest_granting = oldpolicy->latest_granting + 1; in security_set_bools()
3120 seqno = newpolicy->latest_granting; in security_set_bools()
3123 rcu_assign_pointer(state->policy, newpolicy); in security_set_bools()
3165 struct selinux_policy *newpolicy) in security_preserve_bools() argument
3176 booldatum = symtab_search(&newpolicy->policydb.p_bools, in security_preserve_bools()
3181 evaluate_cond_nodes(&newpolicy->policydb); in security_preserve_bools()