{
        size_t len;
 
+       if (!selinux_initialized(state))
+               return 0;
+
        read_lock(&state->ss->policy_rwlock);
        len = state->ss->policy->policydb.len;
        read_unlock(&state->ss->policy_rwlock);
        struct ocontext *c;
        int rc = 0;
 
+       if (!selinux_initialized(state)) {
+               *out_sid = SECINITSID_PORT;
+               return 0;
+       }
+
        read_lock(&state->ss->policy_rwlock);
 
        policydb = &state->ss->policy->policydb;
        struct ocontext *c;
        int rc = 0;
 
+       if (!selinux_initialized(state)) {
+               *out_sid = SECINITSID_UNLABELED;
+               return 0;
+       }
+
        read_lock(&state->ss->policy_rwlock);
 
        policydb = &state->ss->policy->policydb;
        struct ocontext *c;
        int rc = 0;
 
+       if (!selinux_initialized(state)) {
+               *out_sid = SECINITSID_UNLABELED;
+               return 0;
+       }
+
        read_lock(&state->ss->policy_rwlock);
 
        policydb = &state->ss->policy->policydb;
        int rc = 0;
        struct ocontext *c;
 
+       if (!selinux_initialized(state)) {
+               *if_sid = SECINITSID_NETIF;
+               return 0;
+       }
+
        read_lock(&state->ss->policy_rwlock);
 
        policydb = &state->ss->policy->policydb;
        int rc;
        struct ocontext *c;
 
+       if (!selinux_initialized(state)) {
+               *out_sid = SECINITSID_NODE;
+               return 0;
+       }
+
        read_lock(&state->ss->policy_rwlock);
 
        policydb = &state->ss->policy->policydb;
 {
        int retval;
 
+       if (!selinux_initialized(state)) {
+               *sid = SECINITSID_UNLABELED;
+               return 0;
+       }
+
        read_lock(&state->ss->policy_rwlock);
        retval = __security_genfs_sid(state->ss->policy,
                                fstype, path, orig_sclass, sid);
        struct superblock_security_struct *sbsec = sb->s_security;
        const char *fstype = sb->s_type->name;
 
+       if (!selinux_initialized(state)) {
+               sbsec->behavior = SECURITY_FS_USE_NONE;
+               sbsec->sid = SECINITSID_UNLABELED;
+               return 0;
+       }
+
        read_lock(&state->ss->policy_rwlock);
 
        policydb = &state->ss->policy->policydb;
        int rc;
        u32 i, seqno = 0;
 
+       if (!selinux_initialized(state))
+               return -EINVAL;
+
        /*
         * NOTE: We do not need to take the policy read-lock
         * around the code below because other policy-modifying
        int rc;
        u32 len;
 
+       if (!selinux_initialized(state))
+               return 0;
+
        read_lock(&state->ss->policy_rwlock);
 
        policydb = &state->ss->policy->policydb;
                return 0;
        }
 
+       if (!selinux_initialized(state))
+               return 0;
+
        read_lock(&state->ss->policy_rwlock);
 
        policydb = &state->ss->policy->policydb;
 {
        int value;
 
+       if (!selinux_initialized(state))
+               return 0;
+
        read_lock(&state->ss->policy_rwlock);
        value = state->ss->policy->policydb.reject_unknown;
        read_unlock(&state->ss->policy_rwlock);
 {
        int value;
 
+       if (!selinux_initialized(state))
+               return 0;
+
        read_lock(&state->ss->policy_rwlock);
        value = state->ss->policy->policydb.allow_unknown;
        read_unlock(&state->ss->policy_rwlock);
 {
        int rc;
 
+       if (!selinux_initialized(state))
+               return 0;
+
        read_lock(&state->ss->policy_rwlock);
        rc = ebitmap_get_bit(&state->ss->policy->policydb.policycaps, req_cap);
        read_unlock(&state->ss->policy_rwlock);
                return -ENOENT;
        }
 
+       if (!selinux_initialized(state))
+               return 0;
+
        read_lock(&state->ss->policy_rwlock);
 
        if (rule->au_seqno < state->ss->latest_granting) {