Lines Matching refs:fp
54 struct policy_file *fp; member
59 avrule_t * avrules, struct policy_file *fp);
61 static int ebitmap_write(ebitmap_t * e, struct policy_file *fp) in ebitmap_write() argument
76 items = put_entry(buf, sizeof(uint32_t), 3, fp); in ebitmap_write()
82 items = put_entry(&bit, sizeof(uint32_t), 1, fp); in ebitmap_write()
86 items = put_entry(&map, sizeof(uint64_t), 1, fp); in ebitmap_write()
106 avtab_ptr_t cur, struct policy_file *fp, in avtab_write_item() argument
160 ERR(fp->handle, "null entry"); in avtab_write_item()
164 ERR(fp->handle, "entry has both access " in avtab_write_item()
190 ERR(fp->handle, "missing node"); in avtab_write_item()
206 ERR(fp->handle, "data count wrong"); in avtab_write_item()
214 items2 = put_entry(buf32, sizeof(uint32_t), items, fp); in avtab_write_item()
227 items = put_entry(buf16, sizeof(uint16_t), 4, fp); in avtab_write_item()
232 ERR(fp->handle, "policy version %u does not support ioctl extended" in avtab_write_item()
239 ERR(fp->handle, "Target platform %s does not support ioctl " in avtab_write_item()
247 items = put_entry(&buf8, sizeof(uint8_t),1,fp); in avtab_write_item()
251 items = put_entry(&buf8, sizeof(uint8_t),1,fp); in avtab_write_item()
256 items = put_entry(buf32, sizeof(uint32_t),8,fp); in avtab_write_item()
261 items = put_entry(buf32, sizeof(uint32_t), 1, fp); in avtab_write_item()
279 static int avtab_write(struct policydb *p, avtab_t * a, struct policy_file *fp) in avtab_write() argument
307 items = put_entry(&nel, sizeof(uint32_t), 1, fp); in avtab_write()
316 if (avtab_write_item(p, cur, fp, 1, !oldvers, &nel)) { in avtab_write()
327 items = put_entry(&nel, sizeof(uint32_t), 1, fp); in avtab_write()
335 if (avtab_write_item(p, cur, fp, 1, 1, NULL)) { in avtab_write()
355 struct policy_file *fp) in mls_write_semantic_level_helper() argument
366 items = put_entry(buf, sizeof(uint32_t), 2, fp); in mls_write_semantic_level_helper()
373 items = put_entry(buf, sizeof(uint32_t), 2, fp); in mls_write_semantic_level_helper()
386 struct policy_file *fp) in mls_write_semantic_range_helper() argument
390 rc = mls_write_semantic_level_helper(&r->level[0], fp); in mls_write_semantic_range_helper()
394 rc = mls_write_semantic_level_helper(&r->level[1], fp); in mls_write_semantic_range_helper()
403 static int mls_write_level(mls_level_t * l, struct policy_file *fp) in mls_write_level() argument
409 items = put_entry(&sens, sizeof(uint32_t), 1, fp); in mls_write_level()
413 if (ebitmap_write(&l->cat, fp)) in mls_write_level()
423 static int mls_write_range_helper(mls_range_t * r, struct policy_file *fp) in mls_write_range_helper() argument
437 items2 = put_entry(buf, sizeof(uint32_t), items, fp); in mls_write_range_helper()
441 if (ebitmap_write(&r->level[0].cat, fp)) in mls_write_range_helper()
444 if (ebitmap_write(&r->level[1].cat, fp)) in mls_write_range_helper()
456 struct policy_file *fp = pd->fp; in sens_write() local
464 items2 = put_entry(buf, sizeof(uint32_t), items, fp); in sens_write()
468 items = put_entry(key, 1, len, fp); in sens_write()
472 if (mls_write_level(levdatum->level, fp)) in sens_write()
484 struct policy_file *fp = pd->fp; in cat_write() local
493 items2 = put_entry(buf, sizeof(uint32_t), items, fp); in cat_write()
497 items = put_entry(key, 1, len, fp); in cat_write()
504 static int role_trans_write(policydb_t *p, struct policy_file *fp) in role_trans_write() argument
520 items = put_entry(buf, sizeof(uint32_t), 1, fp); in role_trans_write()
526 WARN(fp->handle, "Discarding role_transition " in role_trans_write()
535 items = put_entry(buf, sizeof(uint32_t), 3, fp); in role_trans_write()
540 items = put_entry(buf, sizeof(uint32_t), 1, fp); in role_trans_write()
549 static int role_allow_write(role_allow_t * r, struct policy_file *fp) in role_allow_write() argument
559 items = put_entry(buf, sizeof(uint32_t), 1, fp); in role_allow_write()
565 items = put_entry(buf, sizeof(uint32_t), 2, fp); in role_allow_write()
579 void *fp = ptr; in filename_write_one_compat() local
585 items = put_entry(buf, sizeof(uint32_t), 1, fp); in filename_write_one_compat()
589 items = put_entry(ft->name, sizeof(char), len, fp); in filename_write_one_compat()
597 items = put_entry(buf, sizeof(uint32_t), 4, fp); in filename_write_one_compat()
614 void *fp = ptr; in filename_write_one() local
618 items = put_entry(buf, sizeof(uint32_t), 1, fp); in filename_write_one()
622 items = put_entry(ft->name, sizeof(char), len, fp); in filename_write_one()
636 items = put_entry(buf, sizeof(uint32_t), 3, fp); in filename_write_one()
642 if (ebitmap_write(&datum->stypes, fp)) in filename_write_one()
646 items = put_entry(buf, sizeof(uint32_t), 1, fp); in filename_write_one()
656 static int filename_trans_write(struct policydb *p, void *fp) in filename_trans_write() argument
667 items = put_entry(buf, sizeof(uint32_t), 1, fp); in filename_trans_write()
672 fp); in filename_trans_write()
675 items = put_entry(buf, sizeof(uint32_t), 1, fp); in filename_trans_write()
679 rc = hashtab_map(p->filename_trans, filename_write_one, fp); in filename_trans_write()
684 static int role_set_write(role_set_t * x, struct policy_file *fp) in role_set_write() argument
689 if (ebitmap_write(&x->roles, fp)) in role_set_write()
693 items = put_entry(buf, sizeof(uint32_t), 1, fp); in role_set_write()
700 static int type_set_write(type_set_t * x, struct policy_file *fp) in type_set_write() argument
705 if (ebitmap_write(&x->types, fp)) in type_set_write()
707 if (ebitmap_write(&x->negset, fp)) in type_set_write()
711 items = put_entry(buf, sizeof(uint32_t), 1, fp); in type_set_write()
724 struct policy_file *fp = pd->fp; in cond_write_bool() local
734 items2 = put_entry(buf, sizeof(uint32_t), items, fp); in cond_write_bool()
737 items = put_entry(key, 1, len, fp); in cond_write_bool()
744 items = put_entry(buf, sizeof(uint32_t), 1, fp); in cond_write_bool()
762 cond_av_list_t * list, struct policy_file *fp) in cond_write_av_list() argument
787 items = put_entry(buf, sizeof(uint32_t), 1, fp); in cond_write_av_list()
798 if (avtab_write_item(p, cur_list->node, fp, 0, 1, NULL)) in cond_write_av_list()
813 cond_node_t * node, struct policy_file *fp) in cond_write_node() argument
820 items = put_entry(buf, sizeof(uint32_t), 1, fp); in cond_write_node()
830 items = put_entry(buf, sizeof(uint32_t), 1, fp); in cond_write_node()
838 items2 = put_entry(buf, sizeof(uint32_t), items, fp); in cond_write_node()
844 if (cond_write_av_list(p, node->true_list, fp) != 0) in cond_write_node()
846 if (cond_write_av_list(p, node->false_list, fp) != 0) in cond_write_node()
849 if (avrule_write_list(p, node->avtrue_list, fp)) in cond_write_node()
851 if (avrule_write_list(p, node->avfalse_list, fp)) in cond_write_node()
858 items = put_entry(buf, sizeof(uint32_t), 1, fp); in cond_write_node()
867 struct policy_file *fp) in cond_write_list() argument
877 items = put_entry(buf, sizeof(uint32_t), 1, fp); in cond_write_list()
882 if (cond_write_node(p, cur, fp) != 0) in cond_write_list()
893 struct policy_file *fp) in context_write() argument
902 items2 = put_entry(buf, sizeof(uint32_t), items, fp); in context_write()
909 if (mls_write_range_helper(&c->range, fp)) in context_write()
927 struct policy_file *fp = pd->fp; in perm_write() local
935 items2 = put_entry(buf, sizeof(uint32_t), items, fp); in perm_write()
939 items = put_entry(key, 1, len, fp); in perm_write()
952 struct policy_file *fp = pd->fp; in common_write() local
962 items2 = put_entry(buf, sizeof(uint32_t), items, fp); in common_write()
966 items = put_entry(key, 1, len, fp); in common_write()
978 struct policy_file *fp) in write_cons_helper() argument
992 items = put_entry(buf, sizeof(uint32_t), 2, fp); in write_cons_helper()
999 items = put_entry(buf, sizeof(uint32_t), 3, fp); in write_cons_helper()
1007 if (ebitmap_write(&e->names, fp)) { in write_cons_helper()
1011 type_set_write(e->type_names, fp)) || in write_cons_helper()
1014 type_set_write(e->type_names, fp))) { in write_cons_helper()
1034 struct policy_file *fp = pd->fp; in class_write() local
1060 items2 = put_entry(buf, sizeof(uint32_t), items, fp); in class_write()
1064 items = put_entry(key, 1, len, fp); in class_write()
1069 items = put_entry(cladatum->comkey, 1, len2, fp); in class_write()
1076 if (write_cons_helper(p, cladatum->constraints, 0, fp)) in class_write()
1089 items = put_entry(buf, sizeof(uint32_t), 1, fp); in class_write()
1092 if (write_cons_helper(p, cladatum->validatetrans, 1, fp)) in class_write()
1103 WARN(fp->handle, in class_write()
1110 items = put_entry(buf, sizeof(uint32_t), 3, fp); in class_write()
1120 items = put_entry(buf, sizeof(uint32_t), 1, fp); in class_write()
1134 struct policy_file *fp = pd->fp; in role_write() local
1158 items2 = put_entry(buf, sizeof(uint32_t), items, fp); in role_write()
1162 items = put_entry(key, 1, len, fp); in role_write()
1166 if (ebitmap_write(&role->dominates, fp)) in role_write()
1182 if (ebitmap_write(&empty, fp)) in role_write()
1185 if (ebitmap_write(&role->types.types, fp)) in role_write()
1189 if (type_set_write(&role->types, fp)) in role_write()
1196 items = put_entry(buf, sizeof(uint32_t), 1, fp); in role_write()
1200 if (ebitmap_write(&role->roles, fp)) in role_write()
1213 struct policy_file *fp = pd->fp; in type_write() local
1263 WARN(fp->handle, "Warning! Module policy " in type_write()
1269 items2 = put_entry(buf, sizeof(uint32_t), items, fp); in type_write()
1274 if (ebitmap_write(&typdatum->types, fp)) in type_write()
1278 items = put_entry(key, 1, len, fp); in type_write()
1291 struct policy_file *fp = pd->fp; in user_write() local
1302 items2 = put_entry(buf, sizeof(uint32_t), items, fp); in user_write()
1306 items = put_entry(key, 1, len, fp); in user_write()
1311 if (ebitmap_write(&usrdatum->roles.roles, fp)) in user_write()
1314 if (role_set_write(&usrdatum->roles, fp)) in user_write()
1326 if (mls_write_range_helper(&usrdatum->exp_range, fp)) in user_write()
1328 if (mls_write_level(&usrdatum->exp_dfltlevel, fp)) in user_write()
1334 if (mls_write_semantic_range_helper(&usrdatum->range, fp)) in user_write()
1336 if (mls_write_semantic_level_helper(&usrdatum->dfltlevel, fp)) in user_write()
1349 struct policy_file *fp) in ocontext_write_xen() argument
1359 INFO(fp->handle, in ocontext_write_xen()
1367 items = put_entry(buf, sizeof(uint32_t), 1, fp); in ocontext_write_xen()
1376 items = put_entry(buf, sizeof(uint32_t), 1, fp); in ocontext_write_xen()
1379 if (context_write(p, &c->context[0], fp)) in ocontext_write_xen()
1384 items = put_entry(buf, sizeof(uint32_t), 1, fp); in ocontext_write_xen()
1387 if (context_write(p, &c->context[0], fp)) in ocontext_write_xen()
1395 items = put_entry(buf, sizeof(uint32_t), 2, fp); in ocontext_write_xen()
1398 if (context_write(p, &c->context[0], fp)) in ocontext_write_xen()
1408 items = put_entry(b64, sizeof(uint64_t), 2, fp); in ocontext_write_xen()
1413 ERR(fp->handle, "policy version %d" in ocontext_write_xen()
1423 items = put_entry(buf, sizeof(uint32_t), 2, fp); in ocontext_write_xen()
1427 if (context_write(p, &c->context[0], fp)) in ocontext_write_xen()
1432 items = put_entry(buf, sizeof(uint32_t), 1, fp); in ocontext_write_xen()
1435 if (context_write(p, &c->context[0], fp)) in ocontext_write_xen()
1441 items = put_entry(buf, sizeof(uint32_t), 1, fp); in ocontext_write_xen()
1444 items = put_entry(c->u.name, 1, len, fp); in ocontext_write_xen()
1447 if (context_write(p, &c->context[0], fp)) in ocontext_write_xen()
1457 policydb_t *p, struct policy_file *fp) in ocontext_write_selinux() argument
1467 INFO(fp->handle, in ocontext_write_selinux()
1475 items = put_entry(buf, sizeof(uint32_t), 1, fp); in ocontext_write_selinux()
1484 items = put_entry(buf, sizeof(uint32_t), 1, fp); in ocontext_write_selinux()
1487 if (context_write(p, &c->context[0], fp)) in ocontext_write_selinux()
1494 items = put_entry(buf, sizeof(uint32_t), 1, fp); in ocontext_write_selinux()
1497 items = put_entry(c->u.name, 1, len, fp); in ocontext_write_selinux()
1500 if (context_write(p, &c->context[0], fp)) in ocontext_write_selinux()
1502 if (context_write(p, &c->context[1], fp)) in ocontext_write_selinux()
1513 items = put_entry(buf, sizeof(uint32_t), 4, fp); in ocontext_write_selinux()
1517 if (context_write(p, &c->context[0], fp)) in ocontext_write_selinux()
1524 items = put_entry(buf, sizeof(uint32_t), 2, fp); in ocontext_write_selinux()
1527 items = put_entry(c->u.ibendport.dev_name, 1, len, fp); in ocontext_write_selinux()
1531 if (context_write(p, &c->context[0], fp)) in ocontext_write_selinux()
1541 items = put_entry(buf, sizeof(uint32_t), 3, fp); in ocontext_write_selinux()
1544 if (context_write(p, &c->context[0], fp)) in ocontext_write_selinux()
1550 items = put_entry(buf, sizeof(uint32_t), 2, fp); in ocontext_write_selinux()
1553 if (context_write(p, &c->context[0], fp)) in ocontext_write_selinux()
1560 items = put_entry(buf, sizeof(uint32_t), 2, fp); in ocontext_write_selinux()
1563 items = put_entry(c->u.name, 1, len, fp); in ocontext_write_selinux()
1566 if (context_write(p, &c->context[0], fp)) in ocontext_write_selinux()
1574 items = put_entry(buf, sizeof(uint32_t), 8, fp); in ocontext_write_selinux()
1577 if (context_write(p, &c->context[0], fp)) in ocontext_write_selinux()
1587 struct policy_file *fp) in ocontext_write() argument
1592 rc = ocontext_write_selinux(info, p, fp); in ocontext_write()
1595 rc = ocontext_write_xen(info, p, fp); in ocontext_write()
1601 static int genfs_write(policydb_t * p, struct policy_file *fp) in genfs_write() argument
1611 items = put_entry(buf, sizeof(uint32_t), 1, fp); in genfs_write()
1617 items = put_entry(buf, sizeof(uint32_t), 1, fp); in genfs_write()
1620 items = put_entry(genfs->fstype, 1, len, fp); in genfs_write()
1627 items = put_entry(buf, sizeof(uint32_t), 1, fp); in genfs_write()
1633 items = put_entry(buf, sizeof(uint32_t), 1, fp); in genfs_write()
1636 items = put_entry(c->u.name, 1, len, fp); in genfs_write()
1640 items = put_entry(buf, sizeof(uint32_t), 1, fp); in genfs_write()
1643 if (context_write(p, &c->context[0], fp)) in genfs_write()
1654 struct policy_file *fp; member
1680 struct policy_file *fp = args->fp; in range_write_helper() local
1689 WARN(fp->handle, "Discarding range_transition " in range_write_helper()
1698 items = put_entry(buf, sizeof(uint32_t), 2, fp); in range_write_helper()
1703 items = put_entry(buf, sizeof(uint32_t), 1, fp); in range_write_helper()
1707 rc = mls_write_range_helper(r, fp); in range_write_helper()
1714 static int range_write(policydb_t * p, struct policy_file *fp) in range_write() argument
1725 args.fp = fp; in range_write()
1732 items = put_entry(buf, sizeof(uint32_t), 1, fp); in range_write()
1742 struct policy_file *fp) in avrule_write() argument
1751 items2 = put_entry(buf, sizeof(uint32_t), items, fp); in avrule_write()
1755 if (type_set_write(&avrule->stypes, fp)) in avrule_write()
1758 if (type_set_write(&avrule->ttypes, fp)) in avrule_write()
1769 items2 = put_entry(buf, sizeof(uint32_t), items, fp); in avrule_write()
1777 items2 = put_entry(buf, sizeof(uint32_t), items, fp); in avrule_write()
1791 ERR(fp->handle, in avrule_write()
1799 ERR(fp->handle, in avrule_write()
1807 items = put_entry(&buf8, sizeof(uint8_t),1,fp); in avrule_write()
1811 items = put_entry(&buf8, sizeof(uint8_t),1,fp); in avrule_write()
1816 items = put_entry(buf32, sizeof(uint32_t), nel, fp); in avrule_write()
1825 struct policy_file *fp) in avrule_write_list() argument
1838 if (put_entry(buf, sizeof(uint32_t), 1, fp) != 1) in avrule_write_list()
1843 if (avrule_write(p, avrule, fp)) in avrule_write_list()
1869 struct policy_file *fp) in role_trans_rule_write() argument
1883 items = put_entry(buf, sizeof(uint32_t), 1, fp); in role_trans_rule_write()
1889 WARN(fp->handle, "Discarding role_transition " in role_trans_rule_write()
1895 if (role_set_write(&tr->roles, fp)) in role_trans_rule_write()
1897 if (type_set_write(&tr->types, fp)) in role_trans_rule_write()
1900 if (ebitmap_write(&tr->classes, fp)) in role_trans_rule_write()
1903 items = put_entry(buf, sizeof(uint32_t), 1, fp); in role_trans_rule_write()
1910 static int role_allow_rule_write(role_allow_rule_t * r, struct policy_file *fp) in role_allow_rule_write() argument
1920 items = put_entry(buf, sizeof(uint32_t), 1, fp); in role_allow_rule_write()
1924 if (role_set_write(&ra->roles, fp)) in role_allow_rule_write()
1926 if (role_set_write(&ra->new_roles, fp)) in role_allow_rule_write()
1932 static int filename_trans_rule_write(filename_trans_rule_t * t, struct policy_file *fp) in filename_trans_rule_write() argument
1943 items = put_entry(buf, sizeof(uint32_t), 1, fp); in filename_trans_rule_write()
1950 items = put_entry(buf, sizeof(uint32_t), 1, fp); in filename_trans_rule_write()
1954 items = put_entry(ftr->name, sizeof(char), len, fp); in filename_trans_rule_write()
1958 if (type_set_write(&ftr->stypes, fp)) in filename_trans_rule_write()
1960 if (type_set_write(&ftr->ttypes, fp)) in filename_trans_rule_write()
1966 items = put_entry(buf, sizeof(uint32_t), 2, fp); in filename_trans_rule_write()
1974 struct policy_file *fp) in range_trans_rule_write() argument
1984 items = put_entry(buf, sizeof(uint32_t), 1, fp); in range_trans_rule_write()
1988 if (type_set_write(&rt->stypes, fp)) in range_trans_rule_write()
1990 if (type_set_write(&rt->ttypes, fp)) in range_trans_rule_write()
1992 if (ebitmap_write(&rt->tclasses, fp)) in range_trans_rule_write()
1994 if (mls_write_semantic_range_helper(&rt->trange, fp)) in range_trans_rule_write()
2002 struct policy_file *fp) in scope_index_write() argument
2007 if (ebitmap_write(scope_index->scope + i, fp) == -1) { in scope_index_write()
2012 if (put_entry(buf, sizeof(uint32_t), 1, fp) != 1) { in scope_index_write()
2016 if (ebitmap_write(scope_index->class_perms_map + i, fp) == -1) { in scope_index_write()
2024 policydb_t * p, struct policy_file *fp) in avrule_decl_write() argument
2031 if (put_entry(buf, sizeof(uint32_t), 2, fp) != 2) { in avrule_decl_write()
2034 if (cond_write_list(p, decl->cond_list, fp) == -1 || in avrule_decl_write()
2035 avrule_write_list(p, decl->avrules, fp) == -1 || in avrule_decl_write()
2036 role_trans_rule_write(p, decl->role_tr_rules, fp) == -1 || in avrule_decl_write()
2037 role_allow_rule_write(decl->role_allow_rules, fp) == -1) { in avrule_decl_write()
2042 filename_trans_rule_write(decl->filename_trans_rules, fp)) in avrule_decl_write()
2046 range_trans_rule_write(decl->range_tr_rules, fp) == -1) { in avrule_decl_write()
2049 if (scope_index_write(&decl->required, num_scope_syms, fp) == -1 || in avrule_decl_write()
2050 scope_index_write(&decl->declared, num_scope_syms, fp) == -1) { in avrule_decl_write()
2053 pd.fp = fp; in avrule_decl_write()
2058 if (put_entry(buf, sizeof(uint32_t), 2, fp) != 2) { in avrule_decl_write()
2069 policydb_t * p, struct policy_file *fp) in avrule_block_write() argument
2078 if (put_entry(buf, sizeof(uint32_t), 1, fp) != 1) { in avrule_block_write()
2091 if (put_entry(buf, sizeof(uint32_t), 1, fp) != 1) { in avrule_block_write()
2095 if (avrule_decl_write(decl, num_scope_syms, p, fp) == in avrule_block_write()
2108 struct policy_file *fp = pd->fp; in scope_write() local
2128 if (put_entry(buf, sizeof(*buf), 1, fp) != 1 || in scope_write()
2129 put_entry(key, 1, key_len, fp) != key_len) in scope_write()
2138 if (put_entry(buf, sizeof(*buf), items, fp) != items) in scope_write()
2177 int policydb_write(policydb_t * p, struct policy_file *fp) in policydb_write() argument
2189 pd.fp = fp; in policydb_write()
2200 ERR(fp->handle, "policy version %d cannot support MLS", in policydb_write()
2221 items2 = put_entry(buf, sizeof(uint32_t), items, fp); in policydb_write()
2224 items = put_entry(policydb_str, 1, len, fp); in policydb_write()
2233 ERR(fp->handle, "compatibility lookup failed for policy " in policydb_write()
2246 items2 = put_entry(buf, sizeof(uint32_t), items, fp); in policydb_write()
2254 items = put_entry(buf, sizeof(uint32_t), 1, fp); in policydb_write()
2257 items = put_entry(p->name, 1, len, fp); in policydb_write()
2262 items = put_entry(buf, sizeof(uint32_t), 1, fp); in policydb_write()
2265 items = put_entry(p->version, 1, len, fp); in policydb_write()
2276 if (ebitmap_write(&p->policycaps, fp) == -1) in policydb_write()
2285 WARN(fp->handle, "Warning! Policy version %d cannot " in policydb_write()
2294 if (ebitmap_write(&p->permissive_map, fp) == -1) in policydb_write()
2328 items = put_entry(buf, sizeof(uint32_t), 2, fp); in policydb_write()
2336 if (avtab_write(p, &p->te_avtab, fp)) in policydb_write()
2340 WARN(fp->handle, "Discarding " in policydb_write()
2343 if (cond_write_list(p, p->cond_list, fp)) in policydb_write()
2346 if (role_trans_write(p, fp)) in policydb_write()
2348 if (role_allow_write(p->role_allow, fp)) in policydb_write()
2351 if (filename_trans_write(p, fp)) in policydb_write()
2355 WARN(fp->handle, "Discarding filename type transition rules"); in policydb_write()
2358 if (avrule_block_write(p->global, num_syms, p, fp) == -1) { in policydb_write()
2364 if (put_entry(buf, sizeof(uint32_t), 1, fp) != 1) { in policydb_write()
2372 if (ocontext_write(info, p, fp) == -1 || genfs_write(p, fp) == -1) { in policydb_write()
2381 if (range_write(p, fp)) { in policydb_write()
2389 if (ebitmap_write(&p->type_attr_map[i], fp) == -1) in policydb_write()