Lines Matching refs:file_arr

76 	FILE **file_arr;  member
80 FILE **file_arr; member
85 int cil_expr_to_policy(FILE **file_arr, uint32_t file_index, struct cil_list *expr);
87 int cil_combine_policy(FILE **file_arr, FILE *policy_file) in cil_combine_policy() argument
93 fseek(file_arr[i], 0, SEEK_SET); in cil_combine_policy()
94 while (!feof(file_arr[i])) { in cil_combine_policy()
95 rc_read = fread(temp, 1, BUFFER, file_arr[i]); in cil_combine_policy()
96 if (rc_read == 0 && ferror(file_arr[i])) { in cil_combine_policy()
104 if (rc == 0 && ferror(file_arr[i])) { in cil_combine_policy()
115 int cil_portcon_to_policy(FILE **file_arr, struct cil_sort *sort) in cil_portcon_to_policy() argument
121 fprintf(file_arr[NETIFCONS], "portcon "); in cil_portcon_to_policy()
123 fprintf(file_arr[NETIFCONS], "udp "); in cil_portcon_to_policy()
125 fprintf(file_arr[NETIFCONS], "tcp "); in cil_portcon_to_policy()
127 fprintf(file_arr[NETIFCONS], "%d ", portcon->port_low); in cil_portcon_to_policy()
128 fprintf(file_arr[NETIFCONS], "%d ", portcon->port_high); in cil_portcon_to_policy()
129 cil_context_to_policy(file_arr, NETIFCONS, portcon->context); in cil_portcon_to_policy()
130 fprintf(file_arr[NETIFCONS], ";\n"); in cil_portcon_to_policy()
136 int cil_genfscon_to_policy(FILE **file_arr, struct cil_sort *sort) in cil_genfscon_to_policy() argument
142 fprintf(file_arr[NETIFCONS], "genfscon %s ", genfscon->fs_str); in cil_genfscon_to_policy()
143 fprintf(file_arr[NETIFCONS], "%s ", genfscon->path_str); in cil_genfscon_to_policy()
144 cil_context_to_policy(file_arr, NETIFCONS, genfscon->context); in cil_genfscon_to_policy()
145 fprintf(file_arr[NETIFCONS], ";\n"); in cil_genfscon_to_policy()
151 int cil_netifcon_to_policy(FILE **file_arr, struct cil_sort *sort) in cil_netifcon_to_policy() argument
157 fprintf(file_arr[NETIFCONS], "netifcon %s ", netifcon->interface_str); in cil_netifcon_to_policy()
158 cil_context_to_policy(file_arr, NETIFCONS, netifcon->if_context); in cil_netifcon_to_policy()
159 fprintf(file_arr[NETIFCONS], " "); in cil_netifcon_to_policy()
160 cil_context_to_policy(file_arr, NETIFCONS, netifcon->packet_context); in cil_netifcon_to_policy()
161 fprintf(file_arr[NETIFCONS], ";\n"); in cil_netifcon_to_policy()
167 int cil_nodecon_to_policy(FILE **file_arr, struct cil_sort *sort) in cil_nodecon_to_policy() argument
190 fprintf(file_arr[NETIFCONS], "nodecon %s ", buf); in cil_nodecon_to_policy()
207 fprintf(file_arr[NETIFCONS], "%s ", buf); in cil_nodecon_to_policy()
210 cil_context_to_policy(file_arr, NETIFCONS, nodecon->context); in cil_nodecon_to_policy()
211 fprintf(file_arr[NETIFCONS], ";\n"); in cil_nodecon_to_policy()
221 int cil_pirqcon_to_policy(FILE **file_arr, struct cil_sort *sort) in cil_pirqcon_to_policy() argument
227 fprintf(file_arr[NETIFCONS], "pirqcon %d ", pirqcon->pirq); in cil_pirqcon_to_policy()
228 cil_context_to_policy(file_arr, NETIFCONS, pirqcon->context); in cil_pirqcon_to_policy()
229 fprintf(file_arr[NETIFCONS], ";\n"); in cil_pirqcon_to_policy()
234 int cil_iomemcon_to_policy(FILE **file_arr, struct cil_sort *sort) in cil_iomemcon_to_policy() argument
240 …fprintf(file_arr[NETIFCONS], "iomemcon %"PRId64"-%"PRId64" ", iomemcon->iomem_low, iomemcon->iomem… in cil_iomemcon_to_policy()
241 cil_context_to_policy(file_arr, NETIFCONS, iomemcon->context); in cil_iomemcon_to_policy()
242 fprintf(file_arr[NETIFCONS], ";\n"); in cil_iomemcon_to_policy()
248 int cil_ioportcon_to_policy(FILE **file_arr, struct cil_sort *sort) in cil_ioportcon_to_policy() argument
254 fprintf(file_arr[NETIFCONS], "ioportcon %d-%d ", ioportcon->ioport_low, ioportcon->ioport_high); in cil_ioportcon_to_policy()
255 cil_context_to_policy(file_arr, NETIFCONS, ioportcon->context); in cil_ioportcon_to_policy()
256 fprintf(file_arr[NETIFCONS], ";\n"); in cil_ioportcon_to_policy()
262 int cil_pcidevicecon_to_policy(FILE **file_arr, struct cil_sort *sort) in cil_pcidevicecon_to_policy() argument
268 fprintf(file_arr[NETIFCONS], "pcidevicecon %d ", pcidevicecon->dev); in cil_pcidevicecon_to_policy()
269 cil_context_to_policy(file_arr, NETIFCONS, pcidevicecon->context); in cil_pcidevicecon_to_policy()
270 fprintf(file_arr[NETIFCONS], ";\n"); in cil_pcidevicecon_to_policy()
276 int cil_fsuse_to_policy(FILE **file_arr, struct cil_sort *sort) in cil_fsuse_to_policy() argument
283 fprintf(file_arr[NETIFCONS], "fs_use_xattr "); in cil_fsuse_to_policy()
285 fprintf(file_arr[NETIFCONS], "fs_use_task "); in cil_fsuse_to_policy()
287 fprintf(file_arr[NETIFCONS], "fs_use_trans "); in cil_fsuse_to_policy()
291 fprintf(file_arr[NETIFCONS], "%s ", fsuse->fs_str); in cil_fsuse_to_policy()
292 cil_context_to_policy(file_arr, NETIFCONS, fsuse->context); in cil_fsuse_to_policy()
293 fprintf(file_arr[NETIFCONS], ";\n"); in cil_fsuse_to_policy()
337 int cil_userrole_to_policy(FILE **file_arr, struct cil_list *userroles) in cil_userrole_to_policy() argument
354 fprintf(file_arr[USERROLES], "user %s roles {", user_multimap_item->key->name); in cil_userrole_to_policy()
357 fprintf(file_arr[USERROLES], " %s", ((struct cil_role*)current_role->data)->datum.name); in cil_userrole_to_policy()
359 fprintf(file_arr[USERROLES], " };\n"); in cil_userrole_to_policy()
365 int cil_cat_to_policy(FILE **file_arr, struct cil_list *cats) in cil_cat_to_policy() argument
375 fprintf(file_arr[CATS], "category %s", cat_multimap_item->key->name); in cil_cat_to_policy()
377 fprintf(file_arr[CATS], ";\n"); in cil_cat_to_policy()
380 fprintf(file_arr[CATS], " alias"); in cil_cat_to_policy()
382 fprintf(file_arr[CATS], " %s", ((struct cil_cat*)curr_catalias->data)->datum.name); in cil_cat_to_policy()
384 fprintf(file_arr[CATS], ";\n"); in cil_cat_to_policy()
391 int cil_sens_to_policy(FILE **file_arr, struct cil_list *sens) in cil_sens_to_policy() argument
401 fprintf(file_arr[SENS], "sensitivity %s", sens_multimap_item->key->name); in cil_sens_to_policy()
403 fprintf(file_arr[SENS], ";\n"); in cil_sens_to_policy()
406 fprintf(file_arr[SENS], " alias"); in cil_sens_to_policy()
408 fprintf(file_arr[SENS], " %s", ((struct cil_sens*)curr_sensalias->data)->datum.name); in cil_sens_to_policy()
410 fprintf(file_arr[SENS], ";\n"); in cil_sens_to_policy()
417 void cil_cats_to_policy(FILE **file_arr, uint32_t file_index, struct cil_cats *cats) in cil_cats_to_policy() argument
419 cil_expr_to_policy(file_arr, file_index, cats->datum_expr); in cil_cats_to_policy()
422 void cil_level_to_policy(FILE **file_arr, uint32_t file_index, struct cil_level *level) in cil_level_to_policy() argument
426 fprintf(file_arr[file_index], "%s", sens_str); in cil_level_to_policy()
428 fprintf(file_arr[file_index], ":"); in cil_level_to_policy()
429 cil_cats_to_policy(file_arr, file_index, level->cats); in cil_level_to_policy()
433 void cil_levelrange_to_policy(FILE **file_arr, uint32_t file_index, struct cil_levelrange *lvlrange) in cil_levelrange_to_policy() argument
438 cil_level_to_policy(file_arr, file_index, low); in cil_levelrange_to_policy()
439 fprintf(file_arr[file_index], "-"); in cil_levelrange_to_policy()
440 cil_level_to_policy(file_arr, file_index, high); in cil_levelrange_to_policy()
443 void cil_context_to_policy(FILE **file_arr, uint32_t file_index, struct cil_context *context) in cil_context_to_policy() argument
450 fprintf(file_arr[file_index], "%s:%s:%s:", user_str, role_str, type_str); in cil_context_to_policy()
451 cil_levelrange_to_policy(file_arr, file_index, lvlrange); in cil_context_to_policy()
454 void cil_perms_to_policy(FILE **file_arr, uint32_t file_index, struct cil_list *list) in cil_perms_to_policy() argument
458 fprintf(file_arr[file_index], " {"); in cil_perms_to_policy()
462 cil_perms_to_policy(file_arr, file_index, curr->data); in cil_perms_to_policy()
465 fprintf(file_arr[file_index], " %s", (char *)curr->data); in cil_perms_to_policy()
468 fprintf(file_arr[file_index], " %s", ((struct cil_symtab_datum *)curr->data)->name); in cil_perms_to_policy()
494 fprintf(file_arr[file_index], " %s", op_str); in cil_perms_to_policy()
502 fprintf(file_arr[file_index], " }"); in cil_perms_to_policy()
505 void cil_constrain_to_policy_helper(FILE **file_arr, char *kind, struct cil_list *classperms, struc… in cil_constrain_to_policy_helper() argument
513 fprintf(file_arr[CONSTRAINS], "%s %s", kind, cp->class->datum.name); in cil_constrain_to_policy_helper()
514 cil_perms_to_policy(file_arr, CONSTRAINS, cp->perms); in cil_constrain_to_policy_helper()
515 fprintf(file_arr[CONSTRAINS], "\n\t"); in cil_constrain_to_policy_helper()
516 cil_expr_to_policy(file_arr, CONSTRAINS, expr); in cil_constrain_to_policy_helper()
517 fprintf(file_arr[CONSTRAINS], ";\n"); in cil_constrain_to_policy_helper()
522 cil_constrain_to_policy_helper(file_arr, kind, cmp->classperms, expr); in cil_constrain_to_policy_helper()
528 cil_constrain_to_policy_helper(file_arr, kind, cp->classperms, expr); in cil_constrain_to_policy_helper()
533 void cil_constrain_to_policy(FILE **file_arr, __attribute__((unused)) uint32_t file_index, struct c… in cil_constrain_to_policy() argument
543 cil_constrain_to_policy_helper(file_arr, kind, cons->classperms, cons->datum_expr); in cil_constrain_to_policy()
546 void cil_avrule_to_policy_helper(FILE **file_arr, uint32_t file_index, const char *kind, const char… in cil_avrule_to_policy_helper() argument
554 fprintf(file_arr[file_index], "%s %s %s: %s", kind, src, tgt, cp->class->datum.name); in cil_avrule_to_policy_helper()
555 cil_perms_to_policy(file_arr, file_index, cp->perms); in cil_avrule_to_policy_helper()
556 fprintf(file_arr[file_index], ";\n"); in cil_avrule_to_policy_helper()
561 cil_avrule_to_policy_helper(file_arr, file_index, kind, src, tgt, cmp->classperms); in cil_avrule_to_policy_helper()
569 cil_avrule_to_policy_helper(file_arr, file_index, kind, src, tgt, j->data); in cil_avrule_to_policy_helper()
575 int cil_avrule_to_policy(FILE **file_arr, uint32_t file_index, struct cil_avrule *rule) in cil_avrule_to_policy() argument
601 …cil_avrule_to_policy_helper(file_arr, file_index, kind_str, src_str, tgt_str, rule->perms.classper… in cil_avrule_to_policy()
606 int cil_typerule_to_policy(FILE **file_arr, __attribute__((unused)) uint32_t file_index, struct cil… in cil_typerule_to_policy() argument
615 …fprintf(file_arr[ALLOWS], "type_transition %s %s : %s %s;\n", src_str, tgt_str, obj_str, result_st… in cil_typerule_to_policy()
618 fprintf(file_arr[ALLOWS], "type_change %s %s : %s %s\n;", src_str, tgt_str, obj_str, result_str); in cil_typerule_to_policy()
621 fprintf(file_arr[ALLOWS], "type_member %s %s : %s %s;\n", src_str, tgt_str, obj_str, result_str); in cil_typerule_to_policy()
631 int cil_nametypetransition_to_policy(FILE **file_arr, uint32_t file_index, struct cil_nametypetrans… in cil_nametypetransition_to_policy() argument
638 …fprintf(file_arr[file_index], "type_transition %s %s : %s %s %s;\n", src_str, tgt_str, obj_str, re… in cil_nametypetransition_to_policy()
812 int cil_expr_to_policy(FILE **file_arr, uint32_t file_index, struct cil_list *expr) in cil_expr_to_policy() argument
821 fprintf(file_arr[file_index], "%s", str_out); in cil_expr_to_policy()
834 FILE **file_arr; in __cil_booleanif_node_helper() local
838 file_arr = args->file_arr; in __cil_booleanif_node_helper()
843 rc = cil_avrule_to_policy(file_arr, *file_index, (struct cil_avrule*)node->data); in __cil_booleanif_node_helper()
850 rc = cil_typerule_to_policy(file_arr, *file_index, (struct cil_type_rule*)node->data); in __cil_booleanif_node_helper()
857 fprintf(file_arr[*file_index], "else {\n"); in __cil_booleanif_node_helper()
871 FILE **file_arr; in __cil_booleanif_last_child_helper() local
875 file_arr = args->file_arr; in __cil_booleanif_last_child_helper()
879 fprintf(file_arr[*file_index], "}\n"); in __cil_booleanif_last_child_helper()
885 int cil_booleanif_to_policy(FILE **file_arr, uint32_t file_index, struct cil_tree_node *node) in cil_booleanif_to_policy() argument
895 extra_args.file_arr = file_arr; in cil_booleanif_to_policy()
898 fprintf(file_arr[file_index], "if "); in cil_booleanif_to_policy()
900 rc = cil_expr_to_policy(file_arr, file_index, expr); in cil_booleanif_to_policy()
924 fprintf(file_arr[file_index], "{\n"); in cil_booleanif_to_policy()
932 fprintf(file_arr[file_index], "}\n"); in cil_booleanif_to_policy()
935 fprintf(file_arr[file_index], "else {\n"); in cil_booleanif_to_policy()
941 fprintf(file_arr[file_index], "}\n"); in cil_booleanif_to_policy()
947 int cil_name_to_policy(FILE **file_arr, struct cil_tree_node *current) in cil_name_to_policy() argument
954 …fprintf(file_arr[TYPEATTRTYPES], "attribute %s;\n", ((struct cil_symtab_datum*)current->data)->nam… in cil_name_to_policy()
957 fprintf(file_arr[TYPEATTRTYPES], "type %s;\n", ((struct cil_symtab_datum*)current->data)->name); in cil_name_to_policy()
961 …fprintf(file_arr[ALIASES], "typealias %s alias %s;\n", ((struct cil_symtab_datum*)alias->actual)->… in cil_name_to_policy()
966 fprintf(file_arr[ALLOWS], "typebounds %s %s;\n", bnds->parent_str, bnds->child_str); in cil_name_to_policy()
971 …fprintf(file_arr[TYPEATTRTYPES], "permissive %s;\n", ((struct cil_symtab_datum*)typeperm->type)->n… in cil_name_to_policy()
975 fprintf(file_arr[TYPEATTRTYPES], "role %s;\n", ((struct cil_symtab_datum*)current->data)->name); in cil_name_to_policy()
979 …fprintf(file_arr[TYPEATTRTYPES], "bool %s %s;\n", ((struct cil_symtab_datum*)current->data)->name,… in cil_name_to_policy()
983 fprintf(file_arr[COMMONS], "common %s", ((struct cil_symtab_datum*)current->data)->name); in cil_name_to_policy()
987 fprintf(file_arr[COMMONS], " {"); in cil_name_to_policy()
995 fprintf(file_arr[COMMONS], "%s ", ((struct cil_symtab_datum*)current->data)->name); in cil_name_to_policy()
1002 fprintf(file_arr[COMMONS], "}\n"); in cil_name_to_policy()
1007 rc = cil_avrule_to_policy(file_arr, ALLOWS, avrule); in cil_name_to_policy()
1016 rc = cil_typerule_to_policy(file_arr, ALLOWS, rule); in cil_name_to_policy()
1025 rc = cil_nametypetransition_to_policy(file_arr, ALLOWS, nametypetrans); in cil_name_to_policy()
1038 …fprintf(file_arr[ALLOWS], "role_transition %s %s:%s %s;\n", src_str, tgt_str, obj_str, result_str); in cil_name_to_policy()
1046 fprintf(file_arr[ALLOWS], "roleallow %s %s;\n", src_str, tgt_str); in cil_name_to_policy()
1054 fprintf(file_arr[ALIASES], "role %s types %s\n", role_str, type_str); in cil_name_to_policy()
1058 fprintf(file_arr[LEVELS], "level "); in cil_name_to_policy()
1059 cil_level_to_policy(file_arr, LEVELS, (struct cil_level*)current->data); in cil_name_to_policy()
1060 fprintf(file_arr[LEVELS], ";\n"); in cil_name_to_policy()
1063 cil_constrain_to_policy(file_arr, CONSTRAINS, (struct cil_constrain*)current->data, flavor); in cil_name_to_policy()
1066 cil_constrain_to_policy(file_arr, CONSTRAINS, (struct cil_constrain*)current->data, flavor); in cil_name_to_policy()
1070 fprintf(file_arr[CONSTRAINS], "validatetrans"); in cil_name_to_policy()
1071 fprintf(file_arr[CONSTRAINS], " %s ", ((struct cil_class*)vt->class)->datum.name); in cil_name_to_policy()
1072 cil_expr_to_policy(file_arr, CONSTRAINS, vt->datum_expr); in cil_name_to_policy()
1073 fprintf(file_arr[CONSTRAINS], ";\n"); in cil_name_to_policy()
1078 fprintf(file_arr[CONSTRAINS], "mlsvalidatetrans"); in cil_name_to_policy()
1079 fprintf(file_arr[CONSTRAINS], " %s " , ((struct cil_class*)vt->class)->datum.name); in cil_name_to_policy()
1080 cil_expr_to_policy(file_arr, CONSTRAINS, vt->datum_expr); in cil_name_to_policy()
1081 fprintf(file_arr[CONSTRAINS], ";\n"); in cil_name_to_policy()
1085 fprintf(file_arr[ISIDS], "sid %s\n", ((struct cil_symtab_datum*)current->data)->name); in cil_name_to_policy()
1089 fprintf(file_arr[SIDS], "sid %s ", sidcon->sid_str); in cil_name_to_policy()
1090 cil_context_to_policy(file_arr, SIDS, sidcon->context); in cil_name_to_policy()
1091 fprintf(file_arr[SIDS], "\n"); in cil_name_to_policy()
1095 …fprintf(file_arr[TYPEATTRTYPES], "policycap %s;\n", ((struct cil_symtab_datum*)current->data)->nam… in cil_name_to_policy()
1111 FILE **file_arr = NULL; in __cil_gen_policy_node_helper() local
1123 file_arr = args->file_arr; in __cil_gen_policy_node_helper()
1132 rc = cil_booleanif_to_policy(file_arr, CONDS, node); in __cil_gen_policy_node_helper()
1147 rc = cil_name_to_policy(file_arr, node); in __cil_gen_policy_node_helper()
1171 rc = cil_name_to_policy(file_arr, node); in __cil_gen_policy_node_helper()
1189 FILE **file_arr = cil_malloc(sizeof(FILE*) * NUM_POLICY_FILES); in cil_gen_policy() local
1203 file_arr[CLASS_DECL] = fdopen(mkstemp(temp), "w+"); in cil_gen_policy()
1207 file_arr[ISIDS] = fdopen(mkstemp(temp), "w+"); in cil_gen_policy()
1211 file_arr[COMMONS] = fdopen(mkstemp(temp), "w+"); in cil_gen_policy()
1215 file_arr[CLASSES] = fdopen(mkstemp(temp), "w+"); in cil_gen_policy()
1219 file_arr[INTERFACES] = fdopen(mkstemp(temp), "w+"); in cil_gen_policy()
1223 file_arr[SENS] = fdopen(mkstemp(temp), "w+"); in cil_gen_policy()
1227 file_arr[CATS] = fdopen(mkstemp(temp), "w+"); in cil_gen_policy()
1231 file_arr[LEVELS] = fdopen(mkstemp(temp), "w+"); in cil_gen_policy()
1235 file_arr[CONSTRAINS] = fdopen(mkstemp(temp), "w+"); in cil_gen_policy()
1239 file_arr[TYPEATTRTYPES] = fdopen(mkstemp(temp), "w+"); in cil_gen_policy()
1243 file_arr[ALIASES] = fdopen(mkstemp(temp), "w+"); in cil_gen_policy()
1247 file_arr[ALLOWS] = fdopen(mkstemp(temp), "w+"); in cil_gen_policy()
1251 file_arr[CONDS] = fdopen(mkstemp(temp), "w+"); in cil_gen_policy()
1255 file_arr[USERROLES] = fdopen(mkstemp(temp), "w+"); in cil_gen_policy()
1259 file_arr[SIDS] = fdopen(mkstemp(temp), "w+"); in cil_gen_policy()
1263 file_arr[NETIFCONS] = fdopen(mkstemp(temp), "w+"); in cil_gen_policy()
1269 fprintf(file_arr[ISIDS], "sid %s ", ((struct cil_sid*)item->data)->datum.name); in cil_gen_policy()
1276 fprintf(file_arr[CLASS_DECL], "class %s\n", class->datum.name); in cil_gen_policy()
1278 fprintf(file_arr[CLASSES], "class %s ", class->datum.name); in cil_gen_policy()
1280 fprintf(file_arr[CLASSES], "inherits %s ", class->common->datum.name); in cil_gen_policy()
1284 fprintf(file_arr[CLASSES], "{ "); in cil_gen_policy()
1286 fprintf(file_arr[CLASSES], "%s ", ((struct cil_symtab_datum*)curr_perm->data)->name); in cil_gen_policy()
1289 fprintf(file_arr[CLASSES], "}"); in cil_gen_policy()
1291 fprintf(file_arr[CLASSES], "\n"); in cil_gen_policy()
1301 fprintf(file_arr[SENS], "sensitivityorder { "); in cil_gen_policy()
1303 fprintf(file_arr[SENS], "%s ", ((struct cil_sens*)item->data)->datum.name); in cil_gen_policy()
1305 fprintf(file_arr[SENS], "};\n"); in cil_gen_policy()
1311 extra_args.file_arr= file_arr; in cil_gen_policy()
1319 rc = cil_netifcon_to_policy(file_arr, db->netifcon); in cil_gen_policy()
1325 rc = cil_genfscon_to_policy(file_arr, db->genfscon); in cil_gen_policy()
1331 rc = cil_portcon_to_policy(file_arr, db->portcon); in cil_gen_policy()
1337 rc = cil_nodecon_to_policy(file_arr, db->nodecon); in cil_gen_policy()
1343 rc = cil_fsuse_to_policy(file_arr, db->fsuse); in cil_gen_policy()
1349 rc = cil_pirqcon_to_policy(file_arr, db->pirqcon); in cil_gen_policy()
1355 rc = cil_iomemcon_to_policy(file_arr, db->iomemcon); in cil_gen_policy()
1361 rc = cil_ioportcon_to_policy(file_arr, db->ioportcon); in cil_gen_policy()
1367 rc = cil_pcidevicecon_to_policy(file_arr, db->pcidevicecon); in cil_gen_policy()
1373 rc = cil_userrole_to_policy(file_arr, users); in cil_gen_policy()
1379 rc = cil_sens_to_policy(file_arr, sens); in cil_gen_policy()
1385 rc = cil_cat_to_policy(file_arr, cats); in cil_gen_policy()
1391 rc = cil_combine_policy(file_arr, policy_file); in cil_gen_policy()
1400 rc = fclose(file_arr[i]); in cil_gen_policy()
1417 free(file_arr); in cil_gen_policy()