Lines Matching refs:args
1307 struct block_te_rules_extra *args = extra_args;
1325 if (args->flavor == node->flavor) {
1327 if (args->rule_kind == rule->rule_kind) {
1329 cil_av_rulex_to_policy(args->out, rule);
1331 cil_av_rule_to_policy(args->out, rule);
1337 if (args->flavor == node->flavor) {
1339 if (args->rule_kind == rule->rule_kind) {
1340 cil_type_rule_to_policy(args->out, rule);
1346 if (args->flavor == node->flavor) {
1347 cil_nametypetransition_to_policy(args->out, node->data);
1351 if (args->flavor == node->flavor) {
1352 cil_rangetransition_to_policy(args->out, node->data);
1357 if (args->flavor == node->flavor) {
1358 cil_typepermissive_to_policy(args->out, node->data);
1370 struct block_te_rules_extra args;
1372 args.out = out;
1374 args.flavor = CIL_TYPEPERMISSIVE;
1375 args.rule_kind = 0;
1376 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1378 args.flavor = CIL_AVRULE;
1379 args.rule_kind = CIL_AVRULE_ALLOWED;
1380 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1381 args.rule_kind = CIL_AVRULE_AUDITALLOW;
1382 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1383 args.rule_kind = CIL_AVRULE_DONTAUDIT;
1384 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1385 args.rule_kind = CIL_AVRULE_NEVERALLOW;
1386 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1388 args.flavor = CIL_AVRULEX;
1389 args.rule_kind = CIL_AVRULE_ALLOWED;
1390 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1391 args.rule_kind = CIL_AVRULE_AUDITALLOW;
1392 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1393 args.rule_kind = CIL_AVRULE_DONTAUDIT;
1394 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1395 args.rule_kind = CIL_AVRULE_NEVERALLOW;
1396 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1398 args.flavor = CIL_TYPE_RULE;
1399 args.rule_kind = CIL_TYPE_TRANSITION;
1400 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1401 args.rule_kind = CIL_TYPE_MEMBER;
1402 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1403 args.rule_kind = CIL_TYPE_CHANGE;
1404 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1405 args.rule_kind = CIL_AVRULE_TYPE;
1406 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1408 args.flavor = CIL_NAMETYPETRANSITION;
1409 args.rule_kind = 0;
1410 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1413 args.flavor = CIL_RANGETRANSITION;
1414 args.rule_kind = 0;
1415 cil_tree_walk(start, __cil_block_te_rules_to_policy_helper, NULL, NULL, &args);
1426 struct te_rules_extra *args = extra_args;
1444 fprintf(args->out, "if ");
1445 cil_cond_expr_to_policy(args->out, bool->datum_expr, CIL_TRUE);
1446 fprintf(args->out," {\n");
1450 cil_block_te_rules_to_policy(args->out, n, args->mls);
1455 fprintf(args->out,"} else {\n");
1456 cil_block_te_rules_to_policy(args->out, n, args->mls);
1458 fprintf(args->out,"}\n");
1471 struct te_rules_extra args;
1473 args.out = out;
1474 args.mls = mls;
1477 cil_tree_walk(head, __cil_te_rules_to_policy_helper, NULL, NULL, &args);