Home | History | Annotate | Download | only in src

Lines Matching defs:args

1309 	struct block_te_rules_extra *args = extra_args;
1327 if (args->flavor == node->flavor) {
1329 if (args->rule_kind == rule->rule_kind) {
1331 cil_av_rulex_to_policy(args->out, rule);
1333 cil_av_rule_to_policy(args->out, rule);
1339 if (args->flavor == node->flavor) {
1341 if (args->rule_kind == rule->rule_kind) {
1342 cil_type_rule_to_policy(args->out, rule);
1348 if (args->flavor == node->flavor) {
1349 cil_nametypetransition_to_policy(args->out, node->data);
1353 if (args->flavor == node->flavor) {
1354 cil_rangetransition_to_policy(args->out, node->data);
1359 if (args->flavor == node->flavor) {
1360 cil_typepermissive_to_policy(args->out, node->data);
1372 struct block_te_rules_extra args;
1374 args.out = out;
1376 args.flavor = CIL_TYPEPERMISSIVE;
1377 args.rule_kind = 0;
1378 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1380 args.flavor = CIL_AVRULE;
1381 args.rule_kind = CIL_AVRULE_ALLOWED;
1382 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1383 args.rule_kind = CIL_AVRULE_AUDITALLOW;
1384 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1385 args.rule_kind = CIL_AVRULE_DONTAUDIT;
1386 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1387 args.rule_kind = CIL_AVRULE_NEVERALLOW;
1388 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1390 args.flavor = CIL_AVRULEX;
1391 args.rule_kind = CIL_AVRULE_ALLOWED;
1392 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1393 args.rule_kind = CIL_AVRULE_AUDITALLOW;
1394 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1395 args.rule_kind = CIL_AVRULE_DONTAUDIT;
1396 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1397 args.rule_kind = CIL_AVRULE_NEVERALLOW;
1398 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1400 args.flavor = CIL_TYPE_RULE;
1401 args.rule_kind = CIL_TYPE_TRANSITION;
1402 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1403 args.rule_kind = CIL_TYPE_MEMBER;
1404 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1405 args.rule_kind = CIL_TYPE_CHANGE;
1406 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1407 args.rule_kind = CIL_AVRULE_TYPE;
1408 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1410 args.flavor = CIL_NAMETYPETRANSITION;
1411 args.rule_kind = 0;
1412 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1415 args.flavor = CIL_RANGETRANSITION;
1416 args.rule_kind = 0;
1417 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1428 struct te_rules_extra *args = extra_args;
1446 fprintf(args->out, "if ");
1447 cil_cond_expr_to_policy(args->out, bool->datum_expr, CIL_TRUE);
1448 fprintf(args->out," {\n");
1452 cil_block_te_rules_to_policy(args->out, n, args->mls);
1457 fprintf(args->out,"} else {\n");
1458 cil_block_te_rules_to_policy(args->out, n, args->mls);
1460 fprintf(args->out,"}\n");
1473 struct te_rules_extra args;
1475 args.out = out;
1476 args.mls = mls;
1479 cil_tree_walk(head, __cil_te_rules_to_policy_helper, NULL, NULL, &args);