System shutdown command.
-
-########################################
-##
-## Role access for shutdown.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`shutdown_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `shutdown_role'($*)) dnl
-
- gen_require(`
- type shutdown_t;
- ')
-
- shutdown_run($2, $1)
-
- allow $2 shutdown_t:process { ptrace signal_perms };
- ps_process_pattern($2, shutdown_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `shutdown_role'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute a domain transition to run shutdown.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`shutdown_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `shutdown_domtrans'($*)) dnl
-
- gen_require(`
- type shutdown_t, shutdown_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, shutdown_exec_t, shutdown_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `shutdown_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute shutdown in the shutdown
-## domain, and allow the specified role
-## the shutdown domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`shutdown_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `shutdown_run'($*)) dnl
-
- gen_require(`
- attribute_role shutdown_roles;
- ')
-
- shutdown_domtrans($1)
- roleattribute $2 shutdown_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `shutdown_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Send generic signals to shutdown.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`shutdown_signal',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `shutdown_signal'($*)) dnl
-
- gen_require(`
- type shutdown_t;
- ')
-
- allow shutdown_t $1:process signal;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `shutdown_signal'($*)) dnl
- ')
-
-
-########################################
-##
-## Send SIGCHLD signals to shutdown.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`shutdown_sigchld',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `shutdown_sigchld'($*)) dnl
-
- gen_require(`
- type shutdown_t;
- ')
-
- allow $1 shutdown_t:process sigchld;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `shutdown_sigchld'($*)) dnl
- ')
-
-
-########################################
-##
-## Get attributes of shutdown executable files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`shutdown_getattr_exec_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `shutdown_getattr_exec_files'($*)) dnl
-
- gen_require(`
- type shutdown_exec_t;
- ')
-
- corecmd_search_bin($1)
- allow $1 shutdown_exec_t:file getattr_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `shutdown_getattr_exec_files'($*)) dnl
- ')
-
-## Ruby on rails deployment for Apache and Nginx servers.
-
-######################################
-##
-## Execute passenger in the passenger domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`passenger_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `passenger_domtrans'($*)) dnl
-
- gen_require(`
- type passenger_t, passenger_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, passenger_exec_t, passenger_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `passenger_domtrans'($*)) dnl
- ')
-
-
-######################################
-##
-## Execute passenger in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`passenger_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `passenger_exec'($*)) dnl
-
- gen_require(`
- type passenger_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, passenger_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `passenger_exec'($*)) dnl
- ')
-
-
-########################################
-##
-## Read passenger lib files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`passenger_read_lib_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `passenger_read_lib_files'($*)) dnl
-
- gen_require(`
- type passenger_var_lib_t;
- ')
-
- files_search_var_lib($1)
- read_files_pattern($1, passenger_var_lib_t, passenger_var_lib_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `passenger_read_lib_files'($*)) dnl
- ')
-
-## Policy for dmesg.
-
-########################################
-##
-## Execute dmesg in the dmesg domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`dmesg_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dmesg_domtrans'($*)) dnl
-
- gen_require(`
- type dmesg_t, dmesg_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, dmesg_exec_t, dmesg_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dmesg_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute dmesg in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`dmesg_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dmesg_exec'($*)) dnl
-
- gen_require(`
- type dmesg_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, dmesg_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dmesg_exec'($*)) dnl
- ')
-
-
-# This should be in an ifdef distro_gentoo but that is not allowed in an if file
-
-########################################
-##
-## Execute dmesg in the dmesg_t domain, and allow the calling role
-## the dmesg_t domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`dmesg_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dmesg_run'($*)) dnl
-
- gen_require(`
- type dmesg_t;
- ')
-
- dmesg_domtrans($1)
- role $2 types dmesg_t;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dmesg_run'($*)) dnl
- ')
-
-## Abstract Machine Test Utility.
-
-########################################
-##
-## Execute a domain transition to run Amtu.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`amtu_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `amtu_domtrans'($*)) dnl
-
- gen_require(`
- type amtu_t, amtu_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, amtu_exec_t, amtu_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `amtu_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute a domain transition to run
-## Amtu, and allow the specified role
-## the Amtu domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`amtu_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `amtu_run'($*)) dnl
-
- gen_require(`
- attribute_role amtu_roles;
- ')
-
- amtu_domtrans($1)
- roleattribute $2 amtu_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `amtu_run'($*)) dnl
- ')
-
-
-########################################
-##
-## All of the rules required to
-## administrate an amtu environment.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`amtu_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `amtu_admin'($*)) dnl
-
- gen_require(`
- type amtu_t, amtu_initrc_exec_t;
- ')
-
- allow $1 amtu_t:process { ptrace signal_perms };
- ps_process_pattern($1, amtu_t)
-
- init_startstop_service($1, $2, amtu_t, amtu_initrc_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `amtu_admin'($*)) dnl
- ')
-
-## Standards Based Linux Instrumentation for Manageability.
-
-########################################
-##
-## Execute gatherd in the gatherd domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`sblim_domtrans_gatherd',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `sblim_domtrans_gatherd'($*)) dnl
-
- gen_require(`
- type sblim_gatherd_t, sblim_gatherd_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, sblim_gatherd_exec_t, sblim_gatherd_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `sblim_domtrans_gatherd'($*)) dnl
- ')
-
-
-########################################
-##
-## Read gatherd pid files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`sblim_read_pid_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `sblim_read_pid_files'($*)) dnl
-
- gen_require(`
- type sblim_runtime_t;
- ')
-
- files_search_pids($1)
- allow $1 sblim_runtime_t:file read_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `sblim_read_pid_files'($*)) dnl
- ')
-
-
-########################################
-##
-## All of the rules required to
-## administrate an sblim environment.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`sblim_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `sblim_admin'($*)) dnl
-
- gen_require(`
- attribute sblim_domain;
- type sblim_initrc_exec_t, sblim_runtime_t;
- ')
-
- allow $1 sblim_domain:process { ptrace signal_perms };
- ps_process_pattern($1, sblim_domain)
-
- init_startstop_service($1, $2, sblim_domain, sblim_initrc_exec_t)
-
- files_search_pids($1)
- admin_pattern($1, sblim_runtime_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `sblim_admin'($*)) dnl
- ')
-
-## Digital Certificate Tracking.
-
-########################################
-##
-## Domain transition to certwatch.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`certwatch_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `certwatch_domtrans'($*)) dnl
-
- gen_require(`
- type certwatch_exec_t, certwatch_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, certwatch_exec_t, certwatch_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `certwatch_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute certwatch in the certwatch
-## domain, and allow the specified role
-## the certwatch domain.
-## backchannel.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`certwatch_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `certwatch_run'($*)) dnl
-
- gen_require(`
- attribute_role certwatch_roles;
- ')
-
- certwatch_domtrans($1)
- roleattribute $2 certwatch_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `certwatch_run'($*)) dnl
- ')
-
-## Linux hardware error daemon.
-
-########################################
-##
-## Execute a domain transition to run mcelog.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`mcelog_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mcelog_domtrans'($*)) dnl
-
- gen_require(`
- type mcelog_t, mcelog_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, mcelog_exec_t, mcelog_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mcelog_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## All of the rules required to
-## administrate an mcelog environment.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`mcelog_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mcelog_admin'($*)) dnl
-
- gen_require(`
- type mcelog_t, mcelog_initrc_exec_t, mcelog_log_t;
- type mcelog_runtime_t, mcelog_etc_t;
- ')
-
- allow $1 mcelog_t:process { ptrace signal_perms };
- ps_process_pattern($1, mcelog_t)
-
- init_startstop_service($1, $2, mcelog_t, mcelog_initrc_exec_t)
-
- files_search_etc($1)
- admin_pattern($1, mcelog_etc_t)
-
- logging_search_logs($1)
- admin_pattern($1, mcelog_log_t)
-
- files_search_pids($1)
- admin_pattern($1, mcelog_runtime_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mcelog_admin'($*)) dnl
- ')
-
-## Advanced Linux Sound Architecture utilities.
-
-########################################
-##
-## Execute a domain transition to run Alsa.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`alsa_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `alsa_domtrans'($*)) dnl
-
- gen_require(`
- type alsa_t, alsa_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, alsa_exec_t, alsa_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `alsa_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute a domain transition to run
-## Alsa, and allow the specified role
-## the Alsa domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`alsa_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `alsa_run'($*)) dnl
-
- gen_require(`
- attribute_role alsa_roles;
- ')
-
- alsa_domtrans($1)
- roleattribute $2 alsa_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `alsa_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write Alsa semaphores.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`alsa_rw_semaphores',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `alsa_rw_semaphores'($*)) dnl
-
- gen_require(`
- type alsa_t;
- ')
-
- allow $1 alsa_t:sem rw_sem_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `alsa_rw_semaphores'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write Alsa shared memory.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`alsa_rw_shared_mem',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `alsa_rw_shared_mem'($*)) dnl
-
- gen_require(`
- type alsa_t;
- ')
-
- allow $1 alsa_t:shm rw_shm_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `alsa_rw_shared_mem'($*)) dnl
- ')
-
-
-########################################
-##
-## Read Alsa configuration content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`alsa_read_config',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `alsa_read_config'($*)) dnl
-
- gen_require(`
- type alsa_etc_t;
- ')
-
- files_search_etc($1)
- allow $1 alsa_etc_t:dir list_dir_perms;
- read_files_pattern($1, alsa_etc_t, alsa_etc_t)
- read_lnk_files_pattern($1, alsa_etc_t, alsa_etc_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `alsa_read_config'($*)) dnl
- ')
-
-
-########################################
-##
-## Manage Alsa config files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`alsa_manage_config',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `alsa_manage_config'($*)) dnl
-
- gen_require(`
- type alsa_etc_t;
- ')
-
- files_search_etc($1)
- allow $1 alsa_etc_t:dir list_dir_perms;
- manage_files_pattern($1, alsa_etc_t, alsa_etc_t)
- read_lnk_files_pattern($1, alsa_etc_t, alsa_etc_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `alsa_manage_config'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## alsa home files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`alsa_manage_home_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `alsa_manage_home_files'($*)) dnl
-
- gen_require(`
- type alsa_home_t;
- ')
-
- userdom_search_user_home_dirs($1)
- allow $1 alsa_home_t:file manage_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `alsa_manage_home_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Read Alsa home files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`alsa_read_home_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `alsa_read_home_files'($*)) dnl
-
- gen_require(`
- type alsa_home_t;
- ')
-
- userdom_search_user_home_dirs($1)
- allow $1 alsa_home_t:file read_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `alsa_read_home_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel alsa home files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`alsa_relabel_home_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `alsa_relabel_home_files'($*)) dnl
-
- gen_require(`
- type alsa_home_t;
- ')
-
- userdom_search_user_home_dirs($1)
- allow $1 alsa_home_t:file relabel_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `alsa_relabel_home_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Create objects in user home
-## directories with the generic alsa
-## home type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Class of the object being created.
-##
-##
-##
-##
-## The name of the object being created.
-##
-##
-#
- define(`alsa_home_filetrans_alsa_home',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `alsa_home_filetrans_alsa_home'($*)) dnl
-
- gen_require(`
- type alsa_home_t;
- ')
-
- userdom_user_home_dir_filetrans($1, alsa_home_t, $2, $3)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `alsa_home_filetrans_alsa_home'($*)) dnl
- ')
-
-
-########################################
-##
-## Read Alsa lib files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`alsa_read_lib',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `alsa_read_lib'($*)) dnl
-
- gen_require(`
- type alsa_var_lib_t;
- ')
-
- files_search_var_lib($1)
- read_files_pattern($1, alsa_var_lib_t, alsa_var_lib_t)
-
- ifdef(`distro_gentoo',`
- # gentoo saves the files in /var/lib/alsa/oss/CardName
- list_dirs_pattern($1, alsa_var_lib_t, alsa_var_lib_t)
- ')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `alsa_read_lib'($*)) dnl
- ')
-
-
-#########################################
-##
-## Write Alsa lib files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`alsa_write_lib',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `alsa_write_lib'($*)) dnl
-
- gen_require(`
- type alsa_var_lib_t;
- ')
-
- files_search_var_lib($1)
- write_files_pattern($1, alsa_var_lib_t, alsa_var_lib_t)
-
- ifdef(`distro_gentoo',`
- # gentoo saves the files in /var/lib/alsa/oss/CardName
- rw_dirs_pattern($1, alsa_var_lib_t, alsa_var_lib_t)
- ')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `alsa_write_lib'($*)) dnl
- ')
-
-
-# Gentoo specific for now, but cannot use ifdef distro_gentoo in an interface
-
-# alsa_domain - see http://oss.tresys.com/pipermail/refpolicy/2014-March/007029.html
-# http://oss.tresys.com/pipermail/refpolicy/2014-April/007044.html
-
-########################################
-##
-## Mark the selected domain as an alsa-capable domain
-##
-##
-##
-## Domain that links with alsa
-##
-##
-##
-##
-## Tmpfs type used for shared memory of the given domain
-##
-##
-#
- define(`alsa_domain',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `alsa_domain'($*)) dnl
-
- gen_require(`
- attribute alsadomain;
- attribute alsatmpfsfile;
- ')
-
- typeattribute $1 alsadomain;
- typeattribute $2 alsatmpfsfile;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `alsa_domain'($*)) dnl
- ')
-
-
-
-## Generate debugging information for system.
-
-########################################
-##
-## Execute a domain transition to run sosreport.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`sosreport_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `sosreport_domtrans'($*)) dnl
-
- gen_require(`
- type sosreport_t, sosreport_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, sosreport_exec_t, sosreport_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `sosreport_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute sosreport in the sosreport
-## domain, and allow the specified
-## role the sosreport domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`sosreport_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `sosreport_run'($*)) dnl
-
- gen_require(`
- attribute_role sosreport_roles;
- ')
-
- sosreport_domtrans($1)
- roleattribute $2 sosreport_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `sosreport_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Role access for sosreport.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`sosreport_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `sosreport_role'($*)) dnl
-
- gen_require(`
- type sosreport_t;
- ')
-
- sosreport_run($2, $1)
-
- allow $2 sosreport_t:process { ptrace signal_perms };
- ps_process_pattern($2, sosreport_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `sosreport_role'($*)) dnl
- ')
-
-
-########################################
-##
-## Read sosreport temporary files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`sosreport_read_tmp_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `sosreport_read_tmp_files'($*)) dnl
-
- gen_require(`
- type sosreport_tmp_t;
- ')
-
- files_search_tmp($1)
- read_files_pattern($1, sosreport_tmp_t, sosreport_tmp_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `sosreport_read_tmp_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Append sosreport temporary files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`sosreport_append_tmp_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `sosreport_append_tmp_files'($*)) dnl
-
- gen_require(`
- type sosreport_tmp_t;
- ')
-
- files_search_tmp($1)
- append_files_pattern($1, sosreport_tmp_t, sosreport_tmp_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `sosreport_append_tmp_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Delete sosreport temporary files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`sosreport_delete_tmp_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `sosreport_delete_tmp_files'($*)) dnl
-
- gen_require(`
- type sosreport_tmp_t;
- ')
-
- files_delete_tmp_dir_entry($1)
- delete_files_pattern($1, sosreport_tmp_t, sosreport_tmp_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `sosreport_delete_tmp_files'($*)) dnl
- ')
-
-## Red Hat utility to change fstab.
-
-########################################
-##
-## Execute updfstab in the updfstab domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`updfstab_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `updfstab_domtrans'($*)) dnl
-
- gen_require(`
- type updfstab_t, updfstab_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, updfstab_exec_t, updfstab_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `updfstab_domtrans'($*)) dnl
- ')
-
-## Utilities for the tboot TXT module.
-
-########################################
-##
-## Execute txt-stat in the txtstat domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`tboot_domtrans_txtstat',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `tboot_domtrans_txtstat'($*)) dnl
-
- gen_require(`
- type txtstat_t, txtstat_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, txtstat_exec_t, txtstat_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `tboot_domtrans_txtstat'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute txt-stat in the txtstat domain, and
-## allow the specified role the txtstat domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## The role to be allowed the txtstat domain.
-##
-##
-#
- define(`tboot_run_txtstat',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `tboot_run_txtstat'($*)) dnl
-
- gen_require(`
- attribute_role txtstat_roles;
- ')
-
- tboot_domtrans_txtstat($1)
- roleattribute $2 txtstat_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `tboot_run_txtstat'($*)) dnl
- ')
-
-## Read files into page cache for improved performance.
-
-########################################
-##
-## Execute a domain transition
-## to run readahead.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`readahead_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `readahead_domtrans'($*)) dnl
-
- gen_require(`
- type readahead_t, readahead_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, readahead_exec_t, readahead_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `readahead_domtrans'($*)) dnl
- ')
-
-## Network analysis utilities
-
-########################################
-##
-## Execute network utilities in the netutils domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`netutils_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `netutils_domtrans'($*)) dnl
-
- gen_require(`
- type netutils_t, netutils_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, netutils_exec_t, netutils_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `netutils_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute network utilities in the netutils domain, and
-## allow the specified role the netutils domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`netutils_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `netutils_run'($*)) dnl
-
- gen_require(`
- type netutils_t;
- ')
-
- netutils_domtrans($1)
- role $2 types netutils_t;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `netutils_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute network utilities in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`netutils_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `netutils_exec'($*)) dnl
-
- gen_require(`
- type netutils_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, netutils_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `netutils_exec'($*)) dnl
- ')
-
-
-########################################
-##
-## Send generic signals to network utilities.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`netutils_signal',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `netutils_signal'($*)) dnl
-
- gen_require(`
- type netutils_t;
- ')
-
- allow $1 netutils_t:process signal;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `netutils_signal'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute ping in the ping domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`netutils_domtrans_ping',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `netutils_domtrans_ping'($*)) dnl
-
- gen_require(`
- type ping_t, ping_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, ping_exec_t, ping_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `netutils_domtrans_ping'($*)) dnl
- ')
-
-
-########################################
-##
-## Send a kill (SIGKILL) signal to ping.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`netutils_kill_ping',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `netutils_kill_ping'($*)) dnl
-
- gen_require(`
- type ping_t;
- ')
-
- allow $1 ping_t:process sigkill;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `netutils_kill_ping'($*)) dnl
- ')
-
-
-########################################
-##
-## Send generic signals to ping.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`netutils_signal_ping',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `netutils_signal_ping'($*)) dnl
-
- gen_require(`
- type ping_t;
- ')
-
- allow $1 ping_t:process signal;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `netutils_signal_ping'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute ping in the ping domain, and
-## allow the specified role the ping domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`netutils_run_ping',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `netutils_run_ping'($*)) dnl
-
- gen_require(`
- type ping_t;
- ')
-
- netutils_domtrans_ping($1)
- role $2 types ping_t;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `netutils_run_ping'($*)) dnl
- ')
-
-
-########################################
-##
-## Conditionally execute ping in the ping domain, and
-## allow the specified role the ping domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`netutils_run_ping_cond',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `netutils_run_ping_cond'($*)) dnl
-
- gen_require(`
- type ping_t;
- bool user_ping;
- ')
-
- role $2 types ping_t;
-
- if ( user_ping ) {
- netutils_domtrans_ping($1)
- }
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `netutils_run_ping_cond'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute ping in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`netutils_exec_ping',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `netutils_exec_ping'($*)) dnl
-
- gen_require(`
- type ping_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, ping_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `netutils_exec_ping'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute traceroute in the traceroute domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`netutils_domtrans_traceroute',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `netutils_domtrans_traceroute'($*)) dnl
-
- gen_require(`
- type traceroute_t, traceroute_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, traceroute_exec_t, traceroute_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `netutils_domtrans_traceroute'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute traceroute in the traceroute domain, and
-## allow the specified role the traceroute domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`netutils_run_traceroute',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `netutils_run_traceroute'($*)) dnl
-
- gen_require(`
- type traceroute_t;
- ')
-
- netutils_domtrans_traceroute($1)
- role $2 types traceroute_t;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `netutils_run_traceroute'($*)) dnl
- ')
-
-
-########################################
-##
-## Conditionally execute traceroute in the traceroute domain, and
-## allow the specified role the traceroute domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`netutils_run_traceroute_cond',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `netutils_run_traceroute_cond'($*)) dnl
-
- gen_require(`
- type traceroute_t;
- bool user_ping;
- ')
-
- role $2 types traceroute_t;
-
- if( user_ping ) {
- netutils_domtrans_traceroute($1)
- }
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `netutils_run_traceroute_cond'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute traceroute in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`netutils_exec_traceroute',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `netutils_exec_traceroute'($*)) dnl
-
- gen_require(`
- type traceroute_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, traceroute_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `netutils_exec_traceroute'($*)) dnl
- ')
-
-##
-## Determine of the console connected to the controlling terminal.
-##
-
-########################################
-##
-## Execute consoletype in the consoletype domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`consoletype_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `consoletype_domtrans'($*)) dnl
-
- gen_require(`
- type consoletype_t, consoletype_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, consoletype_exec_t, consoletype_t)
-
- ifdef(`hide_broken_symptoms', `
- dontaudit consoletype_t $1:socket_class_set { read write };
- ')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `consoletype_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute consoletype in the consoletype domain, and
-## allow the specified role the consoletype domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`consoletype_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `consoletype_run'($*)) dnl
-
- gen_require(`
- type consoletype_t;
- ')
-
- consoletype_domtrans($1)
- role $2 types consoletype_t;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `consoletype_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute consoletype in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`consoletype_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `consoletype_exec'($*)) dnl
-
- gen_require(`
- type consoletype_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, consoletype_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `consoletype_exec'($*)) dnl
- ')
-
-## Sectool security audit tool.
-
-########################################
-##
-## Role access for sectoolm.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`sectoolm_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `sectoolm_role'($*)) dnl
-
- gen_require(`
- type sectoolm_t;
- ')
-
- allow sectoolm_t $2:unix_dgram_socket sendto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `sectoolm_role'($*)) dnl
- ')
-
-## Check file integrity.
-
-#######################################
-##
-## The template to define a samhain domain.
-##
-##
-##
-## Domain prefix to be used.
-##
-##
-#
- define(`samhain_service_template',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `samhain_service_template'($*)) dnl
-
- gen_require(`
- attribute samhain_domain;
- type samhain_exec_t;
- ')
-
- type $1_t, samhain_domain;
- domain_type($1_t)
- domain_entry_file($1_t, samhain_exec_t)
-
- files_read_all_files($1_t)
-
- mls_file_write_all_levels($1_t)
- dnl
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `samhain_service_template'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute samhain in the samhain domain
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`samhain_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `samhain_domtrans'($*)) dnl
-
- gen_require(`
- type samhain_t, samhain_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, samhain_exec_t, samhain_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `samhain_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute samhain in the samhain
-## domain with the clearance security
-## level and allow the specifiled role
-## the samhain domain.
-##
-##
-##
-## Execute samhain in the samhain
-## domain with the clearance security
-## level and allow the specifiled role
-## the samhain domain.
-##
-##
-## The range_transition rule used in
-## this interface requires that the
-## calling domain should have the
-## clearance security level otherwise
-## the MLS constraint for process
-## transition would fail.
-##
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed to access.
-##
-##
-##
-#
- define(`samhain_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `samhain_run'($*)) dnl
-
- gen_require(`
- attribute_role samhain_roles;
- type samhain_exec_t;
- ')
-
- samhain_domtrans($1)
- roleattribute $2 samhain_roles;
-
- ifdef(`enable_mls', `
- range_transition $1 samhain_exec_t:process mls_systemhigh;
- ')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `samhain_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## samhain configuration files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`samhain_manage_config_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `samhain_manage_config_files'($*)) dnl
-
- gen_require(`
- type samhain_etc_t;
- ')
-
- files_rw_etc_dirs($1)
- allow $1 samhain_etc_t:file manage_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `samhain_manage_config_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## samhain database files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`samhain_manage_db_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `samhain_manage_db_files'($*)) dnl
-
- gen_require(`
- type samhain_db_t;
- ')
-
- files_search_var_lib($1)
- manage_files_pattern($1, samhain_db_t, samhain_db_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `samhain_manage_db_files'($*)) dnl
- ')
-
-
-#######################################
-##
-## Create, read, write, and delete
-## samhain init script files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`samhain_manage_init_script_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `samhain_manage_init_script_files'($*)) dnl
-
- gen_require(`
- type samhain_initrc_exec_t;
- ')
-
- files_search_etc($1)
- manage_files_pattern($1, samhain_initrc_exec_t, samhain_initrc_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `samhain_manage_init_script_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## samhain log and log.lock files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`samhain_manage_log_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `samhain_manage_log_files'($*)) dnl
-
- gen_require(`
- type samhain_log_t;
- ')
-
- logging_search_logs($1)
- manage_files_pattern($1, samhain_log_t, samhain_log_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `samhain_manage_log_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## samhain pid files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`samhain_manage_pid_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `samhain_manage_pid_files'($*)) dnl
-
- gen_require(`
- type samhain_runtime_t;
- ')
-
- files_search_pids($1)
- manage_files_pattern($1, samhain_runtime_t, samhain_runtime_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `samhain_manage_pid_files'($*)) dnl
- ')
-
-
-#######################################
-##
-## All of the rules required to
-## administrate the samhain environment.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`samhain_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `samhain_admin'($*)) dnl
-
- gen_require(`
- attribute samhain_domain;
- type samhain_db_t, samhain_etc_t;
- type samhain_initrc_exec_t, samhain_log_t, samhain_runtime_t;
- ')
-
- allow $1 samhain_domain:process { ptrace signal_perms };
- ps_process_pattern($1, samhain_domain)
-
- # duplicate role transition: remove samhain_admin(sysadm_t, sysadm_r) first
- # init_startstop_service($1, $2, samhain_domain, samhain_initrc_exec_t)
-
- files_list_var_lib($1)
- admin_pattern($1, samhain_db_t)
-
- files_list_etc($1)
- admin_pattern($1, { samhain_initrc_exec_t samhain_etc_t })
-
- logging_list_logs($1)
- admin_pattern($1, samhain_log_t)
-
- files_list_pids($1)
- admin_pattern($1, samhain_runtime_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `samhain_admin'($*)) dnl
- ')
-
-## Configuration management system.
-
-########################################
-##
-## Execute puppetca in the puppetca
-## domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`puppet_domtrans_puppetca',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `puppet_domtrans_puppetca'($*)) dnl
-
- gen_require(`
- type puppetca_t, puppetca_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, puppetca_exec_t, puppetca_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `puppet_domtrans_puppetca'($*)) dnl
- ')
-
-
-#####################################
-##
-## Execute puppetca in the puppetca
-## domain and allow the specified
-## role the puppetca domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`puppet_run_puppetca',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `puppet_run_puppetca'($*)) dnl
-
- gen_require(`
- attribute_role puppetca_roles;
- ')
-
- puppet_domtrans_puppetca($1)
- roleattribute $2 puppetca_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `puppet_run_puppetca'($*)) dnl
- ')
-
-
-####################################
-##
-## Read puppet configuration content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`puppet_read_config',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `puppet_read_config'($*)) dnl
-
- gen_require(`
- type puppet_etc_t;
- ')
-
- files_search_etc($1)
- allow $1 puppet_etc_t:dir list_dir_perms;
- allow $1 puppet_etc_t:file read_file_perms;
- allow $1 puppet_etc_t:lnk_file read_lnk_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `puppet_read_config'($*)) dnl
- ')
-
-
-################################################
-##
-## Read Puppet lib files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`puppet_read_lib_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `puppet_read_lib_files'($*)) dnl
-
- gen_require(`
- type puppet_var_lib_t;
- ')
-
- files_search_var_lib($1)
- read_files_pattern($1, puppet_var_lib_t, puppet_var_lib_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `puppet_read_lib_files'($*)) dnl
- ')
-
-
-###############################################
-##
-## Create, read, write, and delete
-## puppet lib files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`puppet_manage_lib_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `puppet_manage_lib_files'($*)) dnl
-
- gen_require(`
- type puppet_var_lib_t;
- ')
-
- files_search_var_lib($1)
- manage_files_pattern($1, puppet_var_lib_t, puppet_var_lib_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `puppet_manage_lib_files'($*)) dnl
- ')
-
-
-#####################################
-##
-## Append puppet log files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`puppet_append_log_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `puppet_append_log_files'($*)) dnl
-
- gen_require(`
- type puppet_log_t;
- ')
-
- logging_search_logs($1)
- append_files_pattern($1, puppet_log_t, puppet_log_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `puppet_append_log_files'($*)) dnl
- ')
-
-
-#####################################
-##
-## Create puppet log files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`puppet_create_log_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `puppet_create_log_files'($*)) dnl
-
- gen_require(`
- type puppet_log_t;
- ')
-
- logging_search_logs($1)
- create_files_pattern($1, puppet_log_t, puppet_log_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `puppet_create_log_files'($*)) dnl
- ')
-
-
-#####################################
-##
-## Read puppet log files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`puppet_read_log_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `puppet_read_log_files'($*)) dnl
-
- gen_require(`
- type puppet_log_t;
- ')
-
- logging_search_logs($1)
- read_files_pattern($1, puppet_log_t, puppet_log_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `puppet_read_log_files'($*)) dnl
- ')
-
-
-################################################
-##
-## Read and write to puppet tempoprary files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`puppet_rw_tmp',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `puppet_rw_tmp'($*)) dnl
-
- gen_require(`
- type puppet_tmp_t;
- ')
-
- files_search_tmp($1)
- allow $1 puppet_tmp_t:file rw_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `puppet_rw_tmp'($*)) dnl
- ')
-
-
-########################################
-##
-## All of the rules required to
-## administrate an puppet environment.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`puppet_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `puppet_admin'($*)) dnl
-
- gen_require(`
- type puppet_initrc_exec_t, puppetmaster_initrc_exec_t, puppet_log_t;
- type puppet_var_lib_t, puppet_tmp_t, puppet_etc_t;
- type puppet_runtime_t, puppetmaster_tmp_t;
- type puppet_t, puppetca_t, puppetmaster_t;
- ')
-
- allow $1 { puppet_t puppetca_t puppetmaster_t }:process { ptrace signal_perms };
- ps_process_pattern($1, { puppet_t puppetca_t puppetmaster_t })
-
- init_startstop_service($1, $2, puppet_t, puppet_initrc_exec_t)
- init_startstop_service($1, $2, puppetmaster_t, puppetmaster_initrc_exec_t)
-
- files_search_etc($1)
- admin_pattern($1, puppet_etc_t)
-
- logging_search_logs($1)
- admin_pattern($1, puppet_log_t)
-
- files_search_var_lib($1)
- admin_pattern($1, puppet_var_lib_t)
-
- files_search_pids($1)
- admin_pattern($1, puppet_runtime_t)
-
- files_search_tmp($1)
- admin_pattern($1, { puppet_tmp_t puppetmaster_tmp_t })
-
- puppet_run_puppetca($1, $2)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `puppet_admin'($*)) dnl
- ')
-
-## Policy for managing user accounts.
-
-########################################
-##
-## Execute chfn in the chfn domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`usermanage_domtrans_chfn',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `usermanage_domtrans_chfn'($*)) dnl
-
- gen_require(`
- type chfn_t, chfn_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, chfn_exec_t, chfn_t)
-
- ifdef(`hide_broken_symptoms',`
- dontaudit chfn_t $1:socket_class_set { read write };
- ')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `usermanage_domtrans_chfn'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute chfn in the chfn domain, and
-## allow the specified role the chfn domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`usermanage_run_chfn',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `usermanage_run_chfn'($*)) dnl
-
- gen_require(`
- attribute_role chfn_roles;
- ')
-
- usermanage_domtrans_chfn($1)
- roleattribute $2 chfn_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `usermanage_run_chfn'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute groupadd in the groupadd domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`usermanage_domtrans_groupadd',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `usermanage_domtrans_groupadd'($*)) dnl
-
- gen_require(`
- type groupadd_t, groupadd_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, groupadd_exec_t, groupadd_t)
-
- ifdef(`hide_broken_symptoms',`
- dontaudit groupadd_t $1:socket_class_set { read write };
- ')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `usermanage_domtrans_groupadd'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute groupadd in the groupadd domain, and
-## allow the specified role the groupadd domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`usermanage_run_groupadd',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `usermanage_run_groupadd'($*)) dnl
-
- gen_require(`
- attribute_role groupadd_roles;
- ')
-
- usermanage_domtrans_groupadd($1)
- roleattribute $2 groupadd_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `usermanage_run_groupadd'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute passwd in the passwd domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`usermanage_domtrans_passwd',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `usermanage_domtrans_passwd'($*)) dnl
-
- gen_require(`
- type passwd_t, passwd_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, passwd_exec_t, passwd_t)
-
- ifdef(`hide_broken_symptoms',`
- dontaudit passwd_t $1:socket_class_set { read write };
- ')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `usermanage_domtrans_passwd'($*)) dnl
- ')
-
-
-########################################
-##
-## Send sigkills to passwd.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`usermanage_kill_passwd',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `usermanage_kill_passwd'($*)) dnl
-
- gen_require(`
- type passwd_t;
- ')
-
- allow $1 passwd_t:process sigkill;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `usermanage_kill_passwd'($*)) dnl
- ')
-
-
-########################################
-##
-## Check if the passwd binary is executable.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`usermanage_check_exec_passwd',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `usermanage_check_exec_passwd'($*)) dnl
-
- gen_require(`
- type passwd_exec_t;
- ')
-
- allow $1 passwd_exec_t:file { execute getattr_file_perms };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `usermanage_check_exec_passwd'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute passwd in the passwd domain, and
-## allow the specified role the passwd domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`usermanage_run_passwd',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `usermanage_run_passwd'($*)) dnl
-
- gen_require(`
- attribute_role passwd_roles;
- ')
-
- usermanage_domtrans_passwd($1)
- roleattribute $2 passwd_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `usermanage_run_passwd'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute password admin functions in
-## the admin passwd domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`usermanage_domtrans_admin_passwd',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `usermanage_domtrans_admin_passwd'($*)) dnl
-
- gen_require(`
- type sysadm_passwd_t, admin_passwd_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, admin_passwd_exec_t, sysadm_passwd_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `usermanage_domtrans_admin_passwd'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute passwd admin functions in the admin
-## passwd domain, and allow the specified role
-## the admin passwd domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`usermanage_run_admin_passwd',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `usermanage_run_admin_passwd'($*)) dnl
-
- gen_require(`
- attribute_role sysadm_passwd_roles;
- ')
-
- usermanage_domtrans_admin_passwd($1)
- roleattribute $2 sysadm_passwd_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `usermanage_run_admin_passwd'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to use useradd fds.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`usermanage_dontaudit_use_useradd_fds',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `usermanage_dontaudit_use_useradd_fds'($*)) dnl
-
- gen_require(`
- type useradd_t;
- ')
-
- dontaudit $1 useradd_t:fd use;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `usermanage_dontaudit_use_useradd_fds'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute useradd in the useradd domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`usermanage_domtrans_useradd',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `usermanage_domtrans_useradd'($*)) dnl
-
- gen_require(`
- type useradd_t, useradd_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, useradd_exec_t, useradd_t)
-
- ifdef(`hide_broken_symptoms',`
- dontaudit useradd_t $1:socket_class_set { read write };
- ')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `usermanage_domtrans_useradd'($*)) dnl
- ')
-
-
-########################################
-##
-## Check if the useradd binaries are executable.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`usermanage_check_exec_useradd',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `usermanage_check_exec_useradd'($*)) dnl
-
- gen_require(`
- type useradd_exec_t;
- ')
-
- allow $1 useradd_exec_t:file { execute getattr_file_perms };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `usermanage_check_exec_useradd'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute useradd in the useradd domain, and
-## allow the specified role the useradd domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`usermanage_run_useradd',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `usermanage_run_useradd'($*)) dnl
-
- gen_require(`
- attribute_role useradd_roles;
- ')
-
- usermanage_domtrans_useradd($1)
- roleattribute $2 useradd_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `usermanage_run_useradd'($*)) dnl
- ')
-
-
-########################################
-##
-## Read the crack database.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`usermanage_read_crack_db',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `usermanage_read_crack_db'($*)) dnl
-
- gen_require(`
- type crack_db_t;
- ')
-
- files_search_var($1)
- read_files_pattern($1, crack_db_t, crack_db_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `usermanage_read_crack_db'($*)) dnl
- ')
-
-## Execute a command with a substitute user
-
-#######################################
-##
-## The role template for the sudo module.
-##
-##
-##
-## This template creates a derived domain which is allowed
-## to change the linux user id, to run commands as a different
-## user.
-##
-##
-##
-##
-## The prefix of the user role (e.g., user
-## is the prefix for user_r).
-##
-##
-##
-##
-## The user role.
-##
-##
-##
-##
-## The user domain associated with the role.
-##
-##
-#
- define(`sudo_role_template',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `sudo_role_template'($*)) dnl
-
-
- gen_require(`
- type sudo_exec_t;
- attribute sudodomain;
- ')
-
- ##############################
- #
- # Declarations
- #
-
- type $1_sudo_t, sudodomain;
- userdom_user_application_domain($1_sudo_t, sudo_exec_t)
- domain_interactive_fd($1_sudo_t)
- domain_role_change_exemption($1_sudo_t)
- role $2 types $1_sudo_t;
-
- ##############################
- #
- # Local Policy
- #
-
- # Use capabilities.
- allow $1_sudo_t self:capability { chown dac_override fowner kill setgid setuid sys_nice sys_resource };
- allow $1_sudo_t self:process { signal_perms getsched setsched getsession getpgid setpgid getcap setcap share getattr getrlimit rlimitinh siginh transition setsockcreate dyntransition noatsecure setkeycreate };
- allow $1_sudo_t self:process { setexec setrlimit };
- allow $1_sudo_t self:fd use;
- allow $1_sudo_t self:fifo_file rw_fifo_file_perms;
- allow $1_sudo_t self:shm create_shm_perms;
- allow $1_sudo_t self:sem create_sem_perms;
- allow $1_sudo_t self:msgq create_msgq_perms;
- allow $1_sudo_t self:msg { send receive };
- allow $1_sudo_t self:unix_dgram_socket create_socket_perms;
- allow $1_sudo_t self:unix_stream_socket create_stream_socket_perms;
- allow $1_sudo_t self:unix_dgram_socket sendto;
- allow $1_sudo_t self:unix_stream_socket connectto;
- allow $1_sudo_t self:key manage_key_perms;
-
- allow $1_sudo_t $3:key search;
-
- # Transmit SIGWINCH to children
- allow $1_sudo_t $3:process signal;
-
- # Enter this derived domain from the user domain
- domtrans_pattern($3, sudo_exec_t, $1_sudo_t)
-
- # By default, revert to the calling domain when a shell is executed.
- corecmd_shell_domtrans($1_sudo_t, $3)
- corecmd_bin_domtrans($1_sudo_t, $3)
- allow $3 $1_sudo_t:fd use;
- allow $3 $1_sudo_t:fifo_file rw_fifo_file_perms;
- allow $3 $1_sudo_t:process signal_perms;
-
- kernel_read_kernel_sysctls($1_sudo_t)
- kernel_read_system_state($1_sudo_t)
- kernel_link_key($1_sudo_t)
-
- corecmd_exec_all_executables($1_sudo_t)
-
- dev_getattr_fs($1_sudo_t)
- dev_read_urand($1_sudo_t)
- dev_rw_generic_usb_dev($1_sudo_t)
- dev_read_sysfs($1_sudo_t)
-
- domain_use_interactive_fds($1_sudo_t)
- domain_sigchld_interactive_fds($1_sudo_t)
- domain_getattr_all_entry_files($1_sudo_t)
-
- files_read_etc_files($1_sudo_t)
- files_read_var_files($1_sudo_t)
- files_read_usr_symlinks($1_sudo_t)
- files_getattr_usr_files($1_sudo_t)
- # for some PAM modules and for cwd
- files_dontaudit_search_home($1_sudo_t)
- files_list_tmp($1_sudo_t)
-
- fs_search_auto_mountpoints($1_sudo_t)
- fs_getattr_xattr_fs($1_sudo_t)
-
- selinux_validate_context($1_sudo_t)
- selinux_compute_relabel_context($1_sudo_t)
-
- term_getattr_pty_fs($1_sudo_t)
- term_dontaudit_getattr_unallocated_ttys($1_sudo_t)
- term_relabel_all_ttys($1_sudo_t)
- term_relabel_all_ptys($1_sudo_t)
-
- auth_run_chk_passwd($1_sudo_t, $2)
- # sudo stores a token in the pam_pid directory
- auth_manage_pam_pid($1_sudo_t)
- auth_use_pam($1_sudo_t)
- auth_pid_filetrans_pam_var_run($1_sudo_t, dir, "sudo")
-
- init_rw_utmp($1_sudo_t)
-
- logging_send_audit_msgs($1_sudo_t)
- logging_send_syslog_msg($1_sudo_t)
-
- miscfiles_read_localization($1_sudo_t)
-
- seutil_read_default_contexts($1_sudo_t)
- seutil_libselinux_linked($1_sudo_t)
-
- userdom_spec_domtrans_all_users($1_sudo_t)
- userdom_create_all_users_keys($1_sudo_t)
- userdom_create_user_pty($1_sudo_t)
- userdom_manage_user_home_content_files($1_sudo_t)
- userdom_manage_user_home_content_symlinks($1_sudo_t)
- userdom_manage_user_tmp_files($1_sudo_t)
- userdom_manage_user_tmp_symlinks($1_sudo_t)
- userdom_setattr_user_ptys($1_sudo_t)
- userdom_use_user_terminals($1_sudo_t)
- # for some PAM modules and for cwd
- userdom_dontaudit_search_user_home_content($1_sudo_t)
- userdom_dontaudit_search_user_home_dirs($1_sudo_t)
-
- ifdef(`hide_broken_symptoms', `
- dontaudit $1_sudo_t $3:socket_class_set { read write };
- ')
-
- tunable_policy(`use_nfs_home_dirs',`
- fs_manage_nfs_files($1_sudo_t)
- ')
-
- tunable_policy(`use_samba_home_dirs',`
- fs_manage_cifs_files($1_sudo_t)
- ')
-
- optional_policy(`
- dbus_system_bus_client($1_sudo_t)
-
- ifdef(`init_systemd',`
- init_dbus_chat($1_sudo_t)
- ')
- ')
-
- optional_policy(`
- fprintd_dbus_chat($1_sudo_t)
- ')
-
- ifdef(`distro_gentoo',`
- # Fix bug 549640 - Add dontaudit getattr on chr and blk devices as is done with regular user domains too
- dev_dontaudit_getattr_all_blk_files($1_sudo_t)
- dev_dontaudit_getattr_all_chr_files($1_sudo_t)
- ')
- dnl
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `sudo_role_template'($*)) dnl
- ')
-
-
-########################################
-##
-## Send a SIGCHLD signal to the sudo domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`sudo_sigchld',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `sudo_sigchld'($*)) dnl
-
- gen_require(`
- attribute sudodomain;
- ')
-
- allow $1 sudodomain:process sigchld;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `sudo_sigchld'($*)) dnl
- ')
-
-## fake-hwclock - Control fake hardware clock.
-
-########################################
-##
-## Execute a domain transition to run fake-hwclock.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`fakehwclock_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `fakehwclock_domtrans'($*)) dnl
-
- refpolicywarn(`$0($*) has been deprecated')
-
- gen_require(`
- type fakehwclock_t, fakehwclock_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, fakehwclock_exec_t, fakehwclock_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `fakehwclock_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute fake-hwclock in the fake-hwclock domain,
-## and allow the specified role
-## the fake-hwclock domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`fakehwclock_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `fakehwclock_run'($*)) dnl
-
- refpolicywarn(`$0($*) has been deprecated')
-
- gen_require(`
- attribute_role fakehwclock_roles;
- ')
-
- fakehwclock_domtrans($1)
- roleattribute $2 fakehwclock_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `fakehwclock_run'($*)) dnl
- ')
-
-
-########################################
-##
-## All the rules required to
-## administrate an fake-hwclock environment.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`fakehwclock_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `fakehwclock_admin'($*)) dnl
-
- gen_require(`
- type fakehwclock_t, fakehwclock_backup_t, fakehwclock_initrc_exec_t;
- type fakehwclock_unit_t;
- ')
-
- admin_process_pattern($1, fakehwclock_t)
-
- init_startstop_service($1, $2, fakehwclock_t, fakehwclock_initrc_exec_t, fakehwclock_unit_t)
-
- files_search_etc($1)
- admin_pattern($1, fakehwclock_backup_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `fakehwclock_admin'($*)) dnl
- ')
-
-## Manage temporary directory sizes and file ages.
-
-########################################
-##
-## Execute tmpreaper in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`tmpreaper_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `tmpreaper_exec'($*)) dnl
-
- gen_require(`
- type tmpreaper_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, tmpreaper_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `tmpreaper_exec'($*)) dnl
- ')
-
-## Anaconda installer.
-## IEEE 802.11 wireless LAN sniffer.
-
-########################################
-##
-## Role access for kismet.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`kismet_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kismet_role'($*)) dnl
-
- gen_require(`
- type kismet_home_t, kismet_tmp_t, kismet_tmpfs_t;
- type kismet_t;
- ')
-
- kismet_run($1, $2)
-
- allow $2 kismet_t:process { ptrace signal_perms };
- ps_process_pattern($2, kismet_t)
-
- allow $2 kismet_home_t:dir { manage_dir_perms relabel_dir_perms };
- allow $2 kismet_home_t:file { manage_file_perms relabel_file_perms };
- userdom_user_home_dir_filetrans($2, kismet_home_t, dir, ".kismet")
-
- allow $2 kismet_tmp_t:dir { manage_dir_perms relabel_dir_perms };
- allow $2 kismet_tmp_t:file { manage_file_perms relabel_file_perms };
- allow $2 kismet_tmp_t:sock_file { manage_sock_file_perms relabel_sock_file_perms };
-
- allow $2 kismet_tmpfs_t:dir { manage_dir_perms relabel_dir_perms };
- allow $2 kismet_tmpfs_t:file { manage_file_perms relabel_file_perms };
- dnl
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kismet_role'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute a domain transition to run kismet.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`kismet_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kismet_domtrans'($*)) dnl
-
- gen_require(`
- type kismet_t, kismet_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, kismet_exec_t, kismet_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kismet_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute kismet in the kismet domain, and
-## allow the specified role the kismet domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`kismet_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kismet_run'($*)) dnl
-
- gen_require(`
- attribute_role kismet_roles;
- ')
-
- kismet_domtrans($1)
- roleattribute $2 kismet_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kismet_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Read kismet pid files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kismet_read_pid_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kismet_read_pid_files'($*)) dnl
-
- gen_require(`
- type kismet_runtime_t;
- ')
-
- files_search_pids($1)
- allow $1 kismet_runtime_t:file read_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kismet_read_pid_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## kismet pid files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kismet_manage_pid_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kismet_manage_pid_files'($*)) dnl
-
- gen_require(`
- type kismet_runtime_t;
- ')
-
- files_search_pids($1)
- allow $1 kismet_runtime_t:file manage_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kismet_manage_pid_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Search kismet lib directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kismet_search_lib',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kismet_search_lib'($*)) dnl
-
- gen_require(`
- type kismet_var_lib_t;
- ')
-
- files_search_var_lib($1)
- allow $1 kismet_var_lib_t:dir search_dir_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kismet_search_lib'($*)) dnl
- ')
-
-
-########################################
-##
-## Read kismet lib files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kismet_read_lib_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kismet_read_lib_files'($*)) dnl
-
- gen_require(`
- type kismet_var_lib_t;
- ')
-
- files_search_var_lib($1)
- allow $1 kismet_var_lib_t:dir list_dir_perms;
- allow $1 kismet_var_lib_t:file read_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kismet_read_lib_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## kismet lib files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kismet_manage_lib_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kismet_manage_lib_files'($*)) dnl
-
- gen_require(`
- type kismet_var_lib_t;
- ')
-
- files_search_var_lib($1)
- manage_files_pattern($1, kismet_var_lib_t, kismet_var_lib_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kismet_manage_lib_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## kismet lib content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kismet_manage_lib',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kismet_manage_lib'($*)) dnl
-
- gen_require(`
- type kismet_var_lib_t;
- ')
-
- files_search_var_lib($1)
- manage_dirs_pattern($1, kismet_var_lib_t, kismet_var_lib_t)
- manage_files_pattern($1, kismet_var_lib_t, kismet_var_lib_t)
- manage_lnk_files_pattern($1, kismet_var_lib_t, kismet_var_lib_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kismet_manage_lib'($*)) dnl
- ')
-
-
-########################################
-##
-## Read kismet log files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kismet_read_log',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kismet_read_log'($*)) dnl
-
- gen_require(`
- type kismet_log_t;
- ')
-
- logging_search_logs($1)
- read_files_pattern($1, kismet_log_t, kismet_log_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kismet_read_log'($*)) dnl
- ')
-
-
-########################################
-##
-## Append kismet log files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kismet_append_log',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kismet_append_log'($*)) dnl
-
- gen_require(`
- type kismet_log_t;
- ')
-
- logging_search_logs($1)
- append_files_pattern($1, kismet_log_t, kismet_log_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kismet_append_log'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## kismet log content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kismet_manage_log',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kismet_manage_log'($*)) dnl
-
- gen_require(`
- type kismet_log_t;
- ')
-
- logging_search_logs($1)
- manage_dirs_pattern($1, kismet_log_t, kismet_log_t)
- manage_files_pattern($1, kismet_log_t, kismet_log_t)
- manage_lnk_files_pattern($1, kismet_log_t, kismet_log_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kismet_manage_log'($*)) dnl
- ')
-
-
-########################################
-##
-## All of the rules required to
-## administrate an kismet environment.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`kismet_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kismet_admin'($*)) dnl
-
- gen_require(`
- type kismet_t, kismet_var_lib_t, kismet_runtime_t;
- type kismet_log_t, kismet_tmp_t, kismet_initrc_exec_t;
- ')
-
- init_startstop_service($1, $2, kismet_t, kismet_initrc_exec_t)
-
- ps_process_pattern($1, kismet_t)
- allow $1 kismet_t:process { ptrace signal_perms };
-
- files_search_var_lib($1)
- admin_pattern($1, kismet_var_lib_t)
-
- files_search_pids($1)
- admin_pattern($1, kismet_runtime_t)
-
- logging_search_logs($1)
- admin_pattern($1, kismet_log_t)
-
- files_search_tmp($1)
- admin_pattern($1, kismet_tmp_t)
-
- kismet_run($1, $2)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kismet_admin'($*)) dnl
- ')
-
-## Decode DMI data for x86/ia64 bioses.
-
-########################################
-##
-## Execute dmidecode in the dmidecode domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`dmidecode_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dmidecode_domtrans'($*)) dnl
-
- gen_require(`
- type dmidecode_t, dmidecode_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, dmidecode_exec_t, dmidecode_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dmidecode_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute dmidecode in the dmidecode
-## domain, and allow the specified
-## role the dmidecode domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`dmidecode_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dmidecode_run'($*)) dnl
-
- gen_require(`
- attribute_role dmidecode_roles;
- ')
-
- dmidecode_domtrans($1)
- roleattribute $2 dmidecode_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dmidecode_run'($*)) dnl
- ')
-
-## Policy for the kernel modules, kernel image, and bootloader.
-
-########################################
-##
-## Execute bootloader in the bootloader domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`bootloader_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `bootloader_domtrans'($*)) dnl
-
- gen_require(`
- type bootloader_t, bootloader_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, bootloader_exec_t, bootloader_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `bootloader_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute bootloader interactively and do
-## a domain transition to the bootloader domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`bootloader_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `bootloader_run'($*)) dnl
-
- gen_require(`
- attribute_role bootloader_roles;
- ')
-
- bootloader_domtrans($1)
- roleattribute $2 bootloader_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `bootloader_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute bootloader in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`bootloader_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `bootloader_exec'($*)) dnl
-
- gen_require(`
- type bootloader_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, bootloader_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `bootloader_exec'($*)) dnl
- ')
-
-
-########################################
-##
-## Read the bootloader configuration file.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`bootloader_read_config',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `bootloader_read_config'($*)) dnl
-
- gen_require(`
- type bootloader_etc_t;
- ')
-
- allow $1 bootloader_etc_t:file read_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `bootloader_read_config'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write the bootloader
-## configuration file.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`bootloader_rw_config',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `bootloader_rw_config'($*)) dnl
-
- gen_require(`
- type bootloader_etc_t;
- ')
-
- allow $1 bootloader_etc_t:file rw_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `bootloader_rw_config'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write the bootloader
-## temporary data in /tmp.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`bootloader_rw_tmp_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `bootloader_rw_tmp_files'($*)) dnl
-
- gen_require(`
- type bootloader_tmp_t;
- ')
-
- files_search_tmp($1)
- allow $1 bootloader_tmp_t:file rw_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `bootloader_rw_tmp_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read and write the bootloader
-## runtime data.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`bootloader_create_runtime_file',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `bootloader_create_runtime_file'($*)) dnl
-
- gen_require(`
- type boot_runtime_t;
- ')
-
- allow $1 boot_runtime_t:file { create_file_perms rw_file_perms };
- files_boot_filetrans($1, boot_runtime_t, file)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `bootloader_create_runtime_file'($*)) dnl
- ')
-
-## Aide filesystem integrity checker.
-
-########################################
-##
-## Execute aide in the aide domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`aide_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `aide_domtrans'($*)) dnl
-
- gen_require(`
- type aide_t, aide_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, aide_exec_t, aide_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `aide_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute aide programs in the AIDE
-## domain and allow the specified role
-## the AIDE domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`aide_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `aide_run'($*)) dnl
-
- gen_require(`
- attribute_role aide_roles;
- ')
-
- aide_domtrans($1)
- roleattribute $2 aide_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `aide_run'($*)) dnl
- ')
-
-
-########################################
-##
-## All of the rules required to
-## administrate an aide environment.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`aide_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `aide_admin'($*)) dnl
-
- gen_require(`
- type aide_t, aide_db_t, aide_log_t;
- ')
-
- allow $1 aide_t:process { ptrace signal_perms };
- ps_process_pattern($1, aide_t)
-
- aide_run($1, $2)
-
- files_list_etc($1)
- admin_pattern($1, aide_db_t)
-
- logging_list_logs($1)
- admin_pattern($1, aide_log_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `aide_admin'($*)) dnl
- ')
-
-## Package Management System.
-
-########################################
-##
-## Execute emerge in the portage domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`portage_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `portage_domtrans'($*)) dnl
-
- gen_require(`
- type portage_t, portage_exec_t;
- type portage_tmp_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, portage_exec_t, portage_t)
-
- can_exec($1, portage_tmp_t) # Portage does exectest
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `portage_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute emerge in the portage domain,
-## and allow the specified role the
-## portage domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`portage_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `portage_run'($*)) dnl
-
- gen_require(`
- attribute_role portage_roles;
- ')
-
- portage_domtrans($1)
- roleattribute $2 portage_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `portage_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Template for portage sandbox.
-##
-##
-##
-## Template for portage sandbox. Portage
-## does all compiling in the sandbox.
-##
-##
-##
-##
-## Domain Allowed Access
-##
-##
-#
- define(`portage_compile_domain',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `portage_compile_domain'($*)) dnl
-
- gen_require(`
- class dbus send_msg;
- type portage_devpts_t, portage_log_t, portage_sandbox_t, portage_srcrepo_t;
- type portage_tmp_t, portage_tmpfs_t;
- ')
-
- allow $1 self:capability { chown dac_override dac_read_search fowner fsetid mknod net_raw setgid setuid };
- dontaudit $1 self:capability sys_chroot;
- allow $1 self:process { transition signal_perms getsched setsched getsession getpgid setpgid getcap setcap share getattr setfscreate noatsecure siginh setrlimit rlimitinh dyntransition execmem setkeycreate setsockcreate getrlimit };
- allow $1 self:fd use;
- allow $1 self:fifo_file rw_fifo_file_perms;
- allow $1 self:shm create_shm_perms;
- allow $1 self:sem create_sem_perms;
- allow $1 self:msgq create_msgq_perms;
- allow $1 self:msg { send receive };
- allow $1 self:unix_dgram_socket create_socket_perms;
- allow $1 self:unix_stream_socket create_stream_socket_perms;
- allow $1 self:unix_dgram_socket sendto;
- allow $1 self:unix_stream_socket connectto;
- # really shouldnt need this
- allow $1 self:tcp_socket create_stream_socket_perms;
- allow $1 self:udp_socket create_socket_perms;
- # misc networking stuff (esp needed for compiling perl):
- allow $1 self:rawip_socket { create ioctl };
- # needed for merging dbus:
- allow $1 self:netlink_selinux_socket { bind create read };
- allow $1 self:dbus send_msg;
-
- allow $1 portage_devpts_t:chr_file { rw_chr_file_perms setattr_chr_file_perms };
- term_create_pty($1, portage_devpts_t)
-
- # write compile logs
- allow $1 portage_log_t:dir setattr_dir_perms;
- allow $1 portage_log_t:file { write_file_perms setattr_file_perms };
-
- # Support live ebuilds (-9999)
- manage_dirs_pattern($1, portage_srcrepo_t, portage_srcrepo_t)
- manage_files_pattern($1, portage_srcrepo_t, portage_srcrepo_t)
- manage_lnk_files_pattern($1, portage_srcrepo_t, portage_srcrepo_t)
- allow $1 portage_srcrepo_t:file map;
-
- # run scripts out of the build directory
- can_exec(portage_sandbox_t, portage_tmp_t)
-
- manage_dirs_pattern($1, portage_tmp_t, portage_tmp_t)
- manage_files_pattern($1, portage_tmp_t, portage_tmp_t)
- manage_lnk_files_pattern($1, portage_tmp_t, portage_tmp_t)
- manage_fifo_files_pattern($1, portage_tmp_t, portage_tmp_t)
- manage_sock_files_pattern($1, portage_tmp_t, portage_tmp_t)
- files_tmp_filetrans($1, portage_tmp_t, { dir file lnk_file sock_file fifo_file })
- # SELinux-enabled programs running in the sandbox
- allow $1 portage_tmp_t:file { relabel_file_perms map };
- allow $1 portage_tmp_t:dir relabel_dir_perms;
-
- manage_files_pattern($1, portage_tmpfs_t, portage_tmpfs_t)
- manage_lnk_files_pattern($1, portage_tmpfs_t, portage_tmpfs_t)
- manage_fifo_files_pattern($1, portage_tmpfs_t, portage_tmpfs_t)
- manage_sock_files_pattern($1, portage_tmpfs_t, portage_tmpfs_t)
- allow $1 portage_tmpfs_t:file map;
- fs_tmpfs_filetrans($1, portage_tmpfs_t, { dir file lnk_file sock_file fifo_file })
-
- kernel_read_system_state($1)
- kernel_read_network_state($1)
- kernel_read_software_raid_state($1)
- kernel_getattr_core_if($1)
- kernel_getattr_message_if($1)
- kernel_read_kernel_sysctls($1)
-
- corecmd_exec_all_executables($1)
-
- # really shouldnt need this but some packages test
- # network access, such as during configure
- # also distcc--need to reinvestigate confining distcc client
- corenet_all_recvfrom_unlabeled($1)
- corenet_all_recvfrom_netlabel($1)
- corenet_tcp_sendrecv_generic_if($1)
- corenet_udp_sendrecv_generic_if($1)
- corenet_raw_sendrecv_generic_if($1)
- corenet_tcp_sendrecv_generic_node($1)
- corenet_udp_sendrecv_generic_node($1)
- corenet_raw_sendrecv_generic_node($1)
- corenet_tcp_connect_all_reserved_ports($1)
- corenet_tcp_connect_distccd_port($1)
- corenet_tcp_connect_git_port($1)
-
- dev_read_sysfs($1)
- dev_read_rand($1)
- dev_read_urand($1)
-
- domain_use_interactive_fds($1)
- domain_dontaudit_read_all_domains_state($1)
- # SELinux-aware installs doing relabels in the sandbox
- domain_obj_id_change_exemption($1)
-
- files_exec_etc_files($1)
- files_exec_usr_src_files($1)
- files_map_usr_files($1)
-
- # Came up with bug #496328
- fs_getattr_tmpfs($1)
- fs_getattr_xattr_fs($1)
- fs_list_noxattr_fs($1)
- fs_read_noxattr_fs_files($1)
- fs_read_noxattr_fs_symlinks($1)
- fs_search_auto_mountpoints($1)
-
- selinux_validate_context($1)
- # needed for merging dbus:
- selinux_compute_access_vector($1)
-
- files_list_non_auth_dirs($1)
- files_read_non_auth_files($1)
- files_read_non_auth_symlinks($1)
-
- libs_exec_lib_files($1)
- # some config scripts use ldd
- libs_exec_ld_so($1)
- libs_exec_ldconfig($1)
-
- logging_send_syslog_msg($1)
-
- miscfiles_read_localization($1)
-
- userdom_use_user_terminals($1)
-
- # SELinux-enabled programs running in the sandbox
- seutil_libselinux_linked($1)
-
- # required by install
- seutil_read_file_contexts($1)
-
- tunable_policy(`portage_use_nfs',`
- fs_getattr_nfs($1)
- fs_manage_nfs_dirs($1)
- fs_manage_nfs_files($1)
- fs_manage_nfs_symlinks($1)
- ')
-
- ifdef(`TODO',`
- # some gui ebuilds want to interact with X server, like xawtv
- optional_policy(`
- allow $1 xdm_xserver_tmp_t:dir { add_entry_dir_perms del_entry_dir_perms };
- allow $1 xdm_xserver_tmp_t:sock_file { create_file_perms delete_file_perms write_file_perms };
- ')
- ') dnl end TODO
-
- ifdef(`distro_gentoo',`
- # Fix bug 496328
- fs_getattr_tmpfs($1)
- ')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `portage_compile_domain'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute tree management functions
-## (fetching, layman, ...) in the
-## portage fetch domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`portage_domtrans_fetch',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `portage_domtrans_fetch'($*)) dnl
-
- gen_require(`
- type portage_fetch_t, portage_fetch_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, portage_fetch_exec_t, portage_fetch_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `portage_domtrans_fetch'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute tree management functions
-## (fetching, layman, ...) in the
-## portage fetch domain, and allow
-## the specified role the portage
-## fetch domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`portage_run_fetch',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `portage_run_fetch'($*)) dnl
-
- gen_require(`
- attribute_role portage_fetch_roles;
- ')
-
- portage_domtrans_fetch($1)
- roleattribute $2 portage_fetch_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `portage_run_fetch'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute gcc-config in the gcc config domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`portage_domtrans_gcc_config',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `portage_domtrans_gcc_config'($*)) dnl
-
- gen_require(`
- type gcc_config_t, gcc_config_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, gcc_config_exec_t, gcc_config_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `portage_domtrans_gcc_config'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute gcc-config in the gcc config
-## domain, and allow the specified role
-## the gcc_config domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`portage_run_gcc_config',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `portage_run_gcc_config'($*)) dnl
-
- gen_require(`
- attribute_role gcc_config_roles;
- ')
-
- portage_domtrans_gcc_config($1)
- roleattribute $2 gcc_config_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `portage_run_gcc_config'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to use
-## portage file descriptors.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`portage_dontaudit_use_fds',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `portage_dontaudit_use_fds'($*)) dnl
-
- gen_require(`
- type portage_t;
- ')
-
- dontaudit $1 portage_t:fd use;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `portage_dontaudit_use_fds'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to search the
-## portage temporary directories.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`portage_dontaudit_search_tmp',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `portage_dontaudit_search_tmp'($*)) dnl
-
- gen_require(`
- type portage_tmp_t;
- ')
-
- dontaudit $1 portage_tmp_t:dir search_dir_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `portage_dontaudit_search_tmp'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to read and write
-## the portage temporary files.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`portage_dontaudit_rw_tmp_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `portage_dontaudit_rw_tmp_files'($*)) dnl
-
- gen_require(`
- type portage_tmp_t;
- ')
-
- dontaudit $1 portage_tmp_t:file rw_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `portage_dontaudit_rw_tmp_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow the domain to run within an eselect module script.
-##
-##
-##
-## Domain to allow within an eselect module
-##
-##
-# Specific to Gentoo,
-# eselect modules allow users to switch between different flavors or versions
-# of underlying components. In return, eselect makes a wrapper binary which
-# makes the proper selections. If this binary is different from bin_t, it might
-# not hold the necessary privileges for the wrapper to function. However, just
-# marking the target binaries doesn't always work, since for python scripts the
-# wrapper doesn't execute it, but treats the target as a library.
-#
- define(`portage_eselect_module',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `portage_eselect_module'($*)) dnl
-
- gen_require(`
- attribute portage_eselect_domain;
- ')
-
- typeattribute $1 portage_eselect_domain;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `portage_eselect_module'($*)) dnl
- ')
-
-
-########################################
-##
-## Read all portage files
-##
-##
-##
-## Role allowed access
-##
-##
-##
-##
-## Domain allowed access
-##
-##
-#
- define(`portage_ro_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `portage_ro_role'($*)) dnl
-
- portage_read_cache($2)
- portage_read_config($2)
- portage_read_db($2)
- portage_read_ebuild($2)
- portage_read_log($2)
- portage_read_srcrepo($2)
- portage_dontaudit_write_cache($2)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `portage_ro_role'($*)) dnl
- ')
-
-
-########################################
-##
-## Read portage db files
-##
-##
-##
-## Domain allowed access
-##
-##
-#
- define(`portage_read_db',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `portage_read_db'($*)) dnl
-
- gen_require(`
- type portage_db_t;
- ')
-
- files_search_var($1)
- list_dirs_pattern($1, portage_db_t, portage_db_t)
- read_files_pattern($1, portage_db_t, portage_db_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `portage_read_db'($*)) dnl
- ')
-
-
-########################################
-##
-## Read portage cache files
-##
-##
-##
-## Domain allowed access
-##
-##
-#
- define(`portage_read_cache',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `portage_read_cache'($*)) dnl
-
- gen_require(`
- type portage_cache_t;
- ')
-
- files_search_var($1)
- list_dirs_pattern($1, portage_cache_t, portage_cache_t)
- read_files_pattern($1, portage_cache_t, portage_cache_t)
- read_lnk_files_pattern($1, portage_cache_t, portage_cache_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `portage_read_cache'($*)) dnl
- ')
-
-
-########################################
-##
-## Read portage configuration files
-##
-##
-##
-## Domain allowed access
-##
-##
-#
- define(`portage_read_config',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `portage_read_config'($*)) dnl
-
- gen_require(`
- type portage_conf_t;
- ')
-
- files_search_etc($1)
- list_dirs_pattern($1, portage_conf_t, portage_conf_t)
- read_files_pattern($1, portage_conf_t, portage_conf_t)
- allow $1 portage_conf_t:file map;
- read_lnk_files_pattern($1, portage_conf_t, portage_conf_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `portage_read_config'($*)) dnl
- ')
-
-
-########################################
-##
-## Read portage ebuild files
-##
-##
-##
-## Domain allowed access
-##
-##
-#
- define(`portage_read_ebuild',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `portage_read_ebuild'($*)) dnl
-
- gen_require(`
- type portage_ebuild_t;
- ')
-
- files_search_usr($1)
- list_dirs_pattern($1, portage_ebuild_t, portage_ebuild_t)
- read_files_pattern($1, portage_ebuild_t, portage_ebuild_t)
- allow $1 portage_ebuild_t:file map;
- read_lnk_files_pattern($1, portage_ebuild_t, portage_ebuild_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `portage_read_ebuild'($*)) dnl
- ')
-
-
-########################################
-##
-## Read portage log files
-##
-##
-##
-## Domain allowed access
-##
-##
-#
- define(`portage_read_log',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `portage_read_log'($*)) dnl
-
- gen_require(`
- type portage_log_t;
- ')
-
- logging_search_logs($1)
- read_files_pattern($1, portage_log_t, portage_log_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `portage_read_log'($*)) dnl
- ')
-
-
-########################################
-##
-## Read portage src repository files
-##
-##
-##
-## Domain allowed access
-##
-##
-#
- define(`portage_read_srcrepo',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `portage_read_srcrepo'($*)) dnl
-
- gen_require(`
- type portage_ebuild_t, portage_srcrepo_t;
- ')
-
- files_search_usr($1)
- list_dirs_pattern($1, portage_ebuild_t, portage_srcrepo_t)
- read_files_pattern($1, portage_srcrepo_t, portage_srcrepo_t)
- allow $1 portage_srcrepo_t:file map;
- read_lnk_files_pattern($1, portage_srcrepo_t, portage_srcrepo_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `portage_read_srcrepo'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit writing portage cache files
-##
-##
-##
-## Domain allowed access
-##
-##
-#
- define(`portage_dontaudit_write_cache',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `portage_dontaudit_write_cache'($*)) dnl
-
- gen_require(`
- type portage_cache_t;
- ')
-
- dontaudit $1 portage_cache_t:dir { setattr write };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `portage_dontaudit_write_cache'($*)) dnl
- ')
-
-
-## Dump topology and locality information from hardware tables.
-
-########################################
-##
-## Execute hwloc dhwd in the hwloc dhwd domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`hwloc_domtrans_dhwd',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `hwloc_domtrans_dhwd'($*)) dnl
-
- gen_require(`
- type hwloc_dhwd_t, hwloc_dhwd_exec_t;
- ')
-
- domtrans_pattern($1, hwloc_dhwd_exec_t, hwloc_dhwd_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `hwloc_domtrans_dhwd'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute hwloc dhwd in the hwloc dhwd domain, and
-## allow the specified role the hwloc dhwd domain,
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`hwloc_run_dhwd',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `hwloc_run_dhwd'($*)) dnl
-
- gen_require(`
- attribute_role hwloc_dhwd_roles;
- ')
-
- hwloc_domtrans_dhwd($1)
- roleattribute $2 hwloc_dhwd_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `hwloc_run_dhwd'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute hwloc dhwd in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`hwloc_exec_dhwd',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `hwloc_exec_dhwd'($*)) dnl
-
- gen_require(`
- type hwloc_dhwd_exec_t;
- ')
-
- can_exec($1, hwloc_dhwd_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `hwloc_exec_dhwd'($*)) dnl
- ')
-
-
-########################################
-##
-## Read hwloc runtime files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`hwloc_read_runtime_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `hwloc_read_runtime_files'($*)) dnl
-
- gen_require(`
- type hwloc_runtime_t;
- ')
-
- files_search_pids($1)
- read_files_pattern($1, hwloc_runtime_t, hwloc_runtime_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `hwloc_read_runtime_files'($*)) dnl
- ')
-
-
-########################################
-##
-## All of the rules required to
-## administrate an hwloc environment.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`hwloc_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `hwloc_admin'($*)) dnl
-
- gen_require(`
- type hwloc_dhwd_t, hwloc_runtime_t;
- ')
-
- allow $1 hwloc_dhwd_t:process { ptrace signal_perms };
- ps_process_pattern($1, hwloc_dhwd_t)
-
- admin_pattern($1, hwloc_runtime_t)
- files_pid_filetrans($1, hwloc_runtime_t, dir, "hwloc")
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `hwloc_admin'($*)) dnl
- ')
-
-## System backup scripts.
-
-########################################
-##
-## Execute backup in the backup domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`backup_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `backup_domtrans'($*)) dnl
-
- gen_require(`
- type backup_t, backup_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, backup_exec_t, backup_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `backup_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute backup in the backup
-## domain, and allow the specified
-## role the backup domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`backup_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `backup_run'($*)) dnl
-
- gen_require(`
- attribute_role backup_roles;
- ')
-
- backup_domtrans($1)
- roleattribute $2 backup_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `backup_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, and write backup
-## store files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`backup_manage_store_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `backup_manage_store_files'($*)) dnl
-
- gen_require(`
- type backup_store_t;
- ')
-
- files_search_var($1)
- manage_files_pattern($1, backup_store_t, backup_store_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `backup_manage_store_files'($*)) dnl
- ')
-
-## System log analyzer and reporter.
-
-########################################
-##
-## Read logwatch temporary files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`logwatch_read_tmp_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `logwatch_read_tmp_files'($*)) dnl
-
- gen_require(`
- type logwatch_tmp_t;
- ')
-
- files_search_tmp($1)
- allow $1 logwatch_tmp_t:file read_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `logwatch_read_tmp_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Search logwatch cache directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`logwatch_search_cache_dir',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `logwatch_search_cache_dir'($*)) dnl
-
- gen_require(`
- type logwatch_cache_t;
- ')
-
- files_search_var($1)
- allow $1 logwatch_cache_t:dir search_dir_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `logwatch_search_cache_dir'($*)) dnl
- ')
-
-## File integrity checker.
-
-########################################
-##
-## Execute tripwire in the tripwire domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`tripwire_domtrans_tripwire',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `tripwire_domtrans_tripwire'($*)) dnl
-
- gen_require(`
- type tripwire_t, tripwire_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, tripwire_exec_t, tripwire_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `tripwire_domtrans_tripwire'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute tripwire in the tripwire
-## domain, and allow the specified
-## role the tripwire domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`tripwire_run_tripwire',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `tripwire_run_tripwire'($*)) dnl
-
- gen_require(`
- attribute_role tripwire_roles;
- ')
-
- tripwire_domtrans_tripwire($1)
- roleattribute $2 tripwire_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `tripwire_run_tripwire'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute twadmin in the twadmin domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`tripwire_domtrans_twadmin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `tripwire_domtrans_twadmin'($*)) dnl
-
- gen_require(`
- type twadmin_t, twadmin_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, twadmin_exec_t, twadmin_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `tripwire_domtrans_twadmin'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute twadmin in the twadmin
-## domain, and allow the specified
-## role the twadmin domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`tripwire_run_twadmin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `tripwire_run_twadmin'($*)) dnl
-
- gen_require(`
- attribute_role twadmin_roles;
- ')
-
- tripwire_domtrans_twadmin($1)
- roleattribute $2 twadmin_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `tripwire_run_twadmin'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute twprint in the twprint domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`tripwire_domtrans_twprint',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `tripwire_domtrans_twprint'($*)) dnl
-
- gen_require(`
- type twprint_t, twprint_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, twprint_exec_t, twprint_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `tripwire_domtrans_twprint'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute twprint in the twprint
-## domain, and allow the specified
-## role the twprint domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`tripwire_run_twprint',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `tripwire_run_twprint'($*)) dnl
-
- gen_require(`
- attribute_role twprint_roles;
- ')
-
- tripwire_domtrans_twprint($1)
- roleattribute $2 twprint_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `tripwire_run_twprint'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute siggen in the siggen domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`tripwire_domtrans_siggen',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `tripwire_domtrans_siggen'($*)) dnl
-
- gen_require(`
- type siggen_t, siggen_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, siggen_exec_t, siggen_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `tripwire_domtrans_siggen'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute siggen in the siggen domain,
-## and allow the specified role
-## the siggen domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`tripwire_run_siggen',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `tripwire_run_siggen'($*)) dnl
-
- gen_require(`
- attribute_role siggen_roles;
- ')
-
- tripwire_domtrans_siggen($1)
- roleattribute $2 siggen_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `tripwire_run_siggen'($*)) dnl
- ')
-
-## Berkeley process accounting.
-
-########################################
-##
-## Transition to the accounting
-## management domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`acct_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `acct_domtrans'($*)) dnl
-
- gen_require(`
- type acct_t, acct_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, acct_exec_t, acct_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `acct_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute accounting management tools
-## in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`acct_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `acct_exec'($*)) dnl
-
- gen_require(`
- type acct_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, acct_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `acct_exec'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute accounting management data
-## in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`acct_exec_data',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `acct_exec_data'($*)) dnl
-
- gen_require(`
- type acct_data_t;
- ')
-
- files_search_var($1)
- can_exec($1, acct_data_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `acct_exec_data'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## process accounting data.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`acct_manage_data',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `acct_manage_data'($*)) dnl
-
- gen_require(`
- type acct_data_t;
- ')
-
- files_search_var($1)
- manage_files_pattern($1, acct_data_t, acct_data_t)
- manage_lnk_files_pattern($1, acct_data_t, acct_data_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `acct_manage_data'($*)) dnl
- ')
-
-
-########################################
-##
-## All of the rules required to
-## administrate an acct environment.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`acct_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `acct_admin'($*)) dnl
-
- gen_require(`
- type acct_t, acct_initrc_exec_t, acct_data_t;
- ')
-
- allow $1 acct_t:process { ptrace signal_perms };
- ps_process_pattern($1, acct_t)
-
- init_startstop_service($1, $2, acct_t, acct_initrc_exec_t)
-
- logging_search_logs($1)
- admin_pattern($1, acct_data_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `acct_admin'($*)) dnl
- ')
-
-## Cross platform network backup.
-
-########################################
-##
-## Execute bacula admin bacula
-## admin domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`bacula_domtrans_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `bacula_domtrans_admin'($*)) dnl
-
- gen_require(`
- type bacula_admin_t, bacula_admin_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, bacula_admin_exec_t, bacula_admin_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `bacula_domtrans_admin'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute user interfaces in the
-## bacula admin domain, and allow the
-## specified role the bacula admin domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`bacula_run_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `bacula_run_admin'($*)) dnl
-
- gen_require(`
- attribute_role bacula_admin_roles;
- ')
-
- bacula_domtrans_admin($1)
- roleattribute $2 bacula_admin_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `bacula_run_admin'($*)) dnl
- ')
-
-
-########################################
-##
-## All of the rules required to
-## administrate an bacula environment.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`bacula_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `bacula_admin'($*)) dnl
-
- gen_require(`
- type bacula_t, bacula_etc_t, bacula_log_t;
- type bacula_spool_t, bacula_var_lib_t;
- type bacula_runtime_t, bacula_initrc_exec_t;
- ')
-
- allow $1 bacula_t:process { ptrace signal_perms };
- ps_process_pattern($1, bacula_t)
-
- init_startstop_service($1, $2, bacula_t, bacula_initrc_exec_t)
-
- files_search_etc($1)
- admin_pattern($1, bacula_etc_t)
-
- logging_search_logs($1)
- admin_pattern($1, bacula_log_t)
-
- files_search_var($1)
- admin_pattern($1, bacula_spool_t)
-
- files_search_var_lib($1)
- admin_pattern($1, bacula_var_lib_t)
-
- files_search_pids($1)
- admin_pattern($1, bacula_runtime_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `bacula_admin'($*)) dnl
- ')
-
-## Initial system configuration utility.
-
-########################################
-##
-## Execute firstboot in the firstboot domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`firstboot_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `firstboot_domtrans'($*)) dnl
-
- gen_require(`
- type firstboot_t, firstboot_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, firstboot_exec_t, firstboot_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `firstboot_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute firstboot in the firstboot
-## domain, and allow the specified role
-## the firstboot domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`firstboot_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `firstboot_run'($*)) dnl
-
- gen_require(`
- attribute_role firstboot_roles;
- ')
-
- firstboot_domtrans($1)
- roleattribute $2 firstboot_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `firstboot_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Inherit and use firstboot file descriptors.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`firstboot_use_fds',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `firstboot_use_fds'($*)) dnl
-
- gen_require(`
- type firstboot_t;
- ')
-
- allow $1 firstboot_t:fd use;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `firstboot_use_fds'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to inherit
-## firstboot file descriptors.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`firstboot_dontaudit_use_fds',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `firstboot_dontaudit_use_fds'($*)) dnl
-
- gen_require(`
- type firstboot_t;
- ')
-
- dontaudit $1 firstboot_t:fd use;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `firstboot_dontaudit_use_fds'($*)) dnl
- ')
-
-
-########################################
-##
-## Write firstboot unnamed pipes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`firstboot_write_pipes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `firstboot_write_pipes'($*)) dnl
-
- gen_require(`
- type firstboot_t;
- ')
-
- allow $1 firstboot_t:fifo_file write;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `firstboot_write_pipes'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and Write firstboot unnamed pipes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`firstboot_rw_pipes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `firstboot_rw_pipes'($*)) dnl
-
- gen_require(`
- type firstboot_t;
- ')
-
- allow $1 firstboot_t:fifo_file { read write };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `firstboot_rw_pipes'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attemps to read and
-## write firstboot unnamed pipes.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`firstboot_dontaudit_rw_pipes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `firstboot_dontaudit_rw_pipes'($*)) dnl
-
- gen_require(`
- type firstboot_t;
- ')
-
- dontaudit $1 firstboot_t:fifo_file { read write };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `firstboot_dontaudit_rw_pipes'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attemps to read and
-## write firstboot unix domain
-## stream sockets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`firstboot_dontaudit_rw_stream_sockets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `firstboot_dontaudit_rw_stream_sockets'($*)) dnl
-
- gen_require(`
- type firstboot_t;
- ')
-
- dontaudit $1 firstboot_t:unix_stream_socket { read write };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `firstboot_dontaudit_rw_stream_sockets'($*)) dnl
- ')
-
-## Cross-platform network configuration library.
-
-########################################
-##
-## Execute a domain transition to run ncftool.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`ncftool_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `ncftool_domtrans'($*)) dnl
-
- gen_require(`
- type ncftool_t, ncftool_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, ncftool_exec_t, ncftool_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `ncftool_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute ncftool in the ncftool
-## domain, and allow the specified
-## role the ncftool domain.
-##
-##
-##
-## Domain allowed access
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`ncftool_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `ncftool_run'($*)) dnl
-
- gen_require(`
- attribute_role ncftool_roles;
- ')
-
- ncftool_domtrans($1)
- roleattribute $2 ncftool_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `ncftool_run'($*)) dnl
- ')
-
-## System administration tool for networks.
-
-#######################################
-##
-## The template to define a cfengine domain.
-##
-##
-##
-## Domain prefix to be used.
-##
-##
-#
- define(`cfengine_domain_template',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `cfengine_domain_template'($*)) dnl
-
- gen_require(`
- attribute cfengine_domain;
- ')
-
- ########################################
- #
- # Declarations
- #
-
- type cfengine_$1_t, cfengine_domain;
- type cfengine_$1_exec_t;
- init_daemon_domain(cfengine_$1_t, cfengine_$1_exec_t)
-
- ########################################
- #
- # Policy
- #
-
- auth_use_nsswitch(cfengine_$1_t)
- dnl
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `cfengine_domain_template'($*)) dnl
- ')
-
-
-########################################
-##
-## Read cfengine lib files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`cfengine_read_lib_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `cfengine_read_lib_files'($*)) dnl
-
- gen_require(`
- type cfengine_var_lib_t;
- ')
-
- files_search_var_lib($1)
- read_files_pattern($1, cfengine_var_lib_t, cfengine_var_lib_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `cfengine_read_lib_files'($*)) dnl
- ')
-
-
-####################################
-##
-## Do not audit attempts to write
-## cfengine log files.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`cfengine_dontaudit_write_log_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `cfengine_dontaudit_write_log_files'($*)) dnl
-
- gen_require(`
- type cfengine_log_t;
- ')
-
- dontaudit $1 cfengine_log_t:file write_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `cfengine_dontaudit_write_log_files'($*)) dnl
- ')
-
-
-########################################
-##
-## All of the rules required to
-## administrate an cfengine environment.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`cfengine_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `cfengine_admin'($*)) dnl
-
- gen_require(`
- attribute cfengine_domain;
- type cfengine_initrc_exec_t, cfengine_log_t, cfengine_var_lib_t;
- ')
-
- allow $1 cfengine_domain:process { ptrace signal_perms };
- ps_process_pattern($1, cfengine_domain)
-
- init_startstop_service($1, $2, cfengine_domain, cfengine_initrc_exec_t)
-
- files_search_var_lib($1)
- admin_pattern($1, { cfengine_log_t cfengine_var_lib_t })
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `cfengine_admin'($*)) dnl
- ')
-
-## SUID/SGID program monitoring.
-
-########################################
-##
-## Read sxid log files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`sxid_read_log',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `sxid_read_log'($*)) dnl
-
- gen_require(`
- type sxid_log_t;
- ')
-
- logging_search_logs($1)
- allow $1 sxid_log_t:file read_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `sxid_read_log'($*)) dnl
- ')
-
-## List kernel modules of USB devices.
-
-########################################
-##
-## Execute usbmodules in the usbmodules domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`usbmodules_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `usbmodules_domtrans'($*)) dnl
-
- gen_require(`
- type usbmodules_t, usbmodules_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, usbmodules_exec_t, usbmodules_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `usbmodules_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute usbmodules in the usbmodules
-## domain, and allow the specified
-## role the usbmodules domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`usbmodules_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `usbmodules_run'($*)) dnl
-
- gen_require(`
- attribute_role usbmodules_roles;
- ')
-
- usbmodules_domtrans($1)
- roleattribute $2 usbmodules_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `usbmodules_run'($*)) dnl
- ')
-
-## Rotates, compresses, removes and mails system log files.
-
-########################################
-##
-## Execute logrotate in the logrotate domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`logrotate_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `logrotate_domtrans'($*)) dnl
-
- gen_require(`
- type logrotate_t, logrotate_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, logrotate_exec_t, logrotate_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `logrotate_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute logrotate in the logrotate
-## domain, and allow the specified
-## role the logrotate domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`logrotate_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `logrotate_run'($*)) dnl
-
- gen_require(`
- attribute_role logrotate_roles;
- ')
-
- logrotate_domtrans($1)
- roleattribute $2 logrotate_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `logrotate_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute logrotate in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`logrotate_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `logrotate_exec'($*)) dnl
-
- gen_require(`
- type logrotate_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, logrotate_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `logrotate_exec'($*)) dnl
- ')
-
-
-########################################
-##
-## Inherit and use logrotate file descriptors.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`logrotate_use_fds',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `logrotate_use_fds'($*)) dnl
-
- gen_require(`
- type logrotate_t;
- ')
-
- allow $1 logrotate_t:fd use;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `logrotate_use_fds'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to inherit
-## logrotate file descriptors.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`logrotate_dontaudit_use_fds',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `logrotate_dontaudit_use_fds'($*)) dnl
-
- gen_require(`
- type logrotate_t;
- ')
-
- dontaudit $1 logrotate_t:fd use;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `logrotate_dontaudit_use_fds'($*)) dnl
- ')
-
-
-########################################
-##
-## Read logrotate temporary files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`logrotate_read_tmp_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `logrotate_read_tmp_files'($*)) dnl
-
- gen_require(`
- type logrotate_tmp_t;
- ')
-
- files_search_tmp($1)
- allow $1 logrotate_tmp_t:file read_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `logrotate_read_tmp_files'($*)) dnl
- ')
-
-## Run shells with substitute user and group.
-
-#######################################
-##
-## Restricted su domain template.
-##
-##
-##
-## This template creates a derived domain which is allowed
-## to change the linux user id, to run shells as a different
-## user.
-##
-##
-##
-##
-## The prefix of the user domain (e.g., user
-## is the prefix for user_t).
-##
-##
-##
-##
-## The type of the user domain.
-##
-##
-##
-##
-## The role associated with the user domain.
-##
-##
-#
- define(`su_restricted_domain_template',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `su_restricted_domain_template'($*)) dnl
-
- gen_require(`
- type su_exec_t;
- ')
-
- type $1_su_t;
- domain_entry_file($1_su_t, su_exec_t)
- domain_type($1_su_t)
- domain_interactive_fd($1_su_t)
- role $3 types $1_su_t;
-
- allow $2 $1_su_t:process signal;
-
- allow $1_su_t self:capability { audit_control audit_write chown dac_override fowner net_bind_service setgid setuid sys_nice sys_resource };
- dontaudit $1_su_t self:capability sys_tty_config;
- allow $1_su_t self:key { search write };
- allow $1_su_t self:process { setexec setsched setrlimit };
- allow $1_su_t self:fifo_file rw_fifo_file_perms;
- allow $1_su_t self:netlink_audit_socket { nlmsg_relay create_netlink_socket_perms };
- allow $1_su_t self:unix_stream_socket create_stream_socket_perms;
-
- # Transition from the user domain to this domain.
- domtrans_pattern($2, su_exec_t, $1_su_t)
-
- # By default, revert to the calling domain when a shell is executed.
- corecmd_shell_domtrans($1_su_t,$2)
- allow $2 $1_su_t:fd use;
- allow $2 $1_su_t:fifo_file rw_file_perms;
- allow $2 $1_su_t:process sigchld;
-
- kernel_read_system_state($1_su_t)
- kernel_read_kernel_sysctls($1_su_t)
- kernel_search_key($1_su_t)
- kernel_link_key($1_su_t)
-
- # for SSP
- dev_read_urand($1_su_t)
-
- files_read_etc_files($1_su_t)
- files_read_etc_runtime_files($1_su_t)
- files_search_var_lib($1_su_t)
- files_dontaudit_getattr_tmp_dirs($1_su_t)
-
- # for the rootok check
- selinux_compute_access_vector($1_su_t)
-
- auth_domtrans_chk_passwd($1_su_t)
- auth_dontaudit_read_shadow($1_su_t)
- auth_use_nsswitch($1_su_t)
- auth_rw_faillog($1_su_t)
-
- domain_use_interactive_fds($1_su_t)
-
- init_dontaudit_use_fds($1_su_t)
- init_dontaudit_use_script_ptys($1_su_t)
- # Write to utmp.
- init_rw_utmp($1_su_t)
- init_search_script_keys($1_su_t)
-
- logging_send_syslog_msg($1_su_t)
-
- miscfiles_read_localization($1_su_t)
-
- ifdef(`distro_redhat',`
- # RHEL5 and possibly newer releases incl. Fedora
- auth_domtrans_upd_passwd($1_su_t)
-
- optional_policy(`
- locallogin_search_keys($1_su_t)
- ')
- ')
-
- optional_policy(`
- cron_read_pipes($1_su_t)
- ')
-
- optional_policy(`
- kerberos_use($1_su_t)
- ')
-
- optional_policy(`
- # used when the password has expired
- usermanage_read_crack_db($1_su_t)
- ')
-
- ifdef(`distro_gentoo',`
- # Fix bug 554080 - Allow su to query SELinux subsystem (netlink_selinux_socket)
- allow $1_su_t self:netlink_selinux_socket { create bind read };
- selinux_get_fs_mount($1_su_t)
- ')
- dnl
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `su_restricted_domain_template'($*)) dnl
- ')
-
-
-#######################################
-##
-## The role template for the su module.
-##
-##
-##
-## The prefix of the user role (e.g., user
-## is the prefix for user_r).
-##
-##
-##
-##
-## The role associated with the user domain.
-##
-##
-##
-##
-## The type of the user domain.
-##
-##
-#
- define(`su_role_template',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `su_role_template'($*)) dnl
-
- gen_require(`
- type su_exec_t;
- ')
-
- type $1_su_t;
- userdom_user_application_domain($1_su_t, su_exec_t)
- domain_interactive_fd($1_su_t)
- role $2 types $1_su_t;
-
- allow $3 $1_su_t:process signal;
-
- allow $1_su_t self:capability { audit_control audit_write chown dac_override fowner net_bind_service setgid setuid sys_nice sys_resource };
- dontaudit $1_su_t self:capability { net_admin sys_tty_config };
- allow $1_su_t self:process { setexec setsched setrlimit };
- allow $1_su_t self:fifo_file rw_fifo_file_perms;
- allow $1_su_t self:netlink_audit_socket { nlmsg_relay create_netlink_socket_perms };
- allow $1_su_t self:key { search write };
-
- allow $1_su_t $3:key search;
-
- # Transition from the user domain to this domain.
- domtrans_pattern($3, su_exec_t, $1_su_t)
-
- ps_process_pattern($3, $1_su_t)
-
- # By default, revert to the calling domain when a shell is executed.
- corecmd_shell_domtrans($1_su_t, $3)
- allow $3 $1_su_t:fd use;
- allow $3 $1_su_t:fifo_file rw_file_perms;
- allow $3 $1_su_t:process sigchld;
-
- kernel_read_system_state($1_su_t)
- kernel_read_kernel_sysctls($1_su_t)
- kernel_search_key($1_su_t)
- kernel_link_key($1_su_t)
-
- # for SSP
- dev_read_urand($1_su_t)
-
- fs_search_auto_mountpoints($1_su_t)
-
- # needed for pam_rootok
- selinux_compute_access_vector($1_su_t)
-
- auth_domtrans_chk_passwd($1_su_t)
- auth_dontaudit_read_shadow($1_su_t)
- auth_use_nsswitch($1_su_t)
- auth_rw_faillog($1_su_t)
-
- corecmd_search_bin($1_su_t)
-
- domain_use_interactive_fds($1_su_t)
-
- files_read_etc_files($1_su_t)
- files_read_etc_runtime_files($1_su_t)
- files_search_var_lib($1_su_t)
- files_dontaudit_getattr_tmp_dirs($1_su_t)
-
- init_dontaudit_use_fds($1_su_t)
- init_dontaudit_read_state($1_su_t)
- # Write to utmp.
- init_rw_utmp($1_su_t)
-
- mls_file_write_all_levels($1_su_t)
-
- logging_send_syslog_msg($1_su_t)
-
- miscfiles_read_localization($1_su_t)
-
- # pam_unix is linked against libselinux
- seutil_libselinux_linked($1_su_t)
-
- userdom_use_user_terminals($1_su_t)
- userdom_search_user_home_dirs($1_su_t)
-
- ifdef(`distro_redhat',`
- # RHEL5 and possibly newer releases incl. Fedora
- auth_domtrans_upd_passwd($1_su_t)
-
- optional_policy(`
- locallogin_search_keys($1_su_t)
- ')
- ')
-
- optional_policy(`
- auth_use_pam_systemd($1_su_t)
- ')
-
- tunable_policy(`allow_polyinstantiation',`
- fs_mount_xattr_fs($1_su_t)
- fs_unmount_xattr_fs($1_su_t)
- ')
-
- tunable_policy(`use_nfs_home_dirs',`
- fs_search_nfs($1_su_t)
- ')
-
- tunable_policy(`use_samba_home_dirs',`
- fs_search_cifs($1_su_t)
- ')
-
- optional_policy(`
- cron_read_pipes($1_su_t)
- ')
-
- optional_policy(`
- kerberos_use($1_su_t)
- ')
-
- optional_policy(`
- # used when the password has expired
- usermanage_read_crack_db($1_su_t)
- ')
-
- # Modify .Xauthority file (via xauth program).
- optional_policy(`
- xserver_user_home_dir_filetrans_user_xauth($1_su_t)
- xserver_domtrans_xauth($1_su_t)
- ')
-
- ifdef(`distro_gentoo',`
- selinux_get_fs_mount($1_su_t)
- ')
- dnl
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `su_role_template'($*)) dnl
- ')
-
-
-#######################################
-##
-## Execute su in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`su_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `su_exec'($*)) dnl
-
- gen_require(`
- type su_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, su_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `su_exec'($*)) dnl
- ')
-
-## Advanced Maryland Automatic Network Disk Archiver.
-
-########################################
-##
-## Execute a domain transition to run
-## Amanda recover.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`amanda_domtrans_recover',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `amanda_domtrans_recover'($*)) dnl
-
- gen_require(`
- type amanda_recover_t, amanda_recover_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, amanda_recover_exec_t, amanda_recover_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `amanda_domtrans_recover'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute a domain transition to run
-## Amanda recover, and allow the specified
-## role the Amanda recover domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`amanda_run_recover',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `amanda_run_recover'($*)) dnl
-
- gen_require(`
- attribute_role amanda_recover_roles;
- ')
-
- amanda_domtrans_recover($1)
- roleattribute $2 amanda_recover_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `amanda_run_recover'($*)) dnl
- ')
-
-
-########################################
-##
-## Search Amanda library directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`amanda_search_lib',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `amanda_search_lib'($*)) dnl
-
- gen_require(`
- type amanda_usr_lib_t;
- ')
-
- files_search_usr($1)
- allow $1 amanda_usr_lib_t:dir search_dir_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `amanda_search_lib'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to read /etc/dumpdates.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`amanda_dontaudit_read_dumpdates',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `amanda_dontaudit_read_dumpdates'($*)) dnl
-
- gen_require(`
- type amanda_dumpdates_t;
- ')
-
- dontaudit $1 amanda_dumpdates_t:file read_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `amanda_dontaudit_read_dumpdates'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write /etc/dumpdates.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`amanda_rw_dumpdates_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `amanda_rw_dumpdates_files'($*)) dnl
-
- gen_require(`
- type amanda_dumpdates_t;
- ')
-
- files_search_etc($1)
- allow $1 amanda_dumpdates_t:file rw_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `amanda_rw_dumpdates_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Manage Amanda library directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`amanda_manage_lib',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `amanda_manage_lib'($*)) dnl
-
- gen_require(`
- type amanda_usr_lib_t;
- ')
-
- files_search_usr($1)
- allow $1 amanda_usr_lib_t:dir manage_dir_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `amanda_manage_lib'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and append amanda log files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`amanda_append_log_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `amanda_append_log_files'($*)) dnl
-
- gen_require(`
- type amanda_log_t;
- ')
-
- logging_search_logs($1)
- allow $1 amanda_log_t:file { read_file_perms append_file_perms };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `amanda_append_log_files'($*)) dnl
- ')
-
-
-#######################################
-##
-## Search Amanda var library directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`amanda_search_var_lib',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `amanda_search_var_lib'($*)) dnl
-
- gen_require(`
- type amanda_var_lib_t;
- ')
-
- files_search_var_lib($1)
- allow $1 amanda_var_lib_t:dir search_dir_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `amanda_search_var_lib'($*)) dnl
- ')
-
-## Prelink ELF shared library mappings.
-
-########################################
-##
-## Execute prelink in the prelink domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`prelink_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `prelink_domtrans'($*)) dnl
-
- gen_require(`
- type prelink_t, prelink_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, prelink_exec_t, prelink_t)
-
- ifdef(`hide_broken_symptoms',`
- dontaudit prelink_t $1:socket_class_set { read write };
- dontaudit prelink_t $1:fifo_file setattr_fifo_file_perms;
- ')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `prelink_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute prelink in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`prelink_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `prelink_exec'($*)) dnl
-
- gen_require(`
- type prelink_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, prelink_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `prelink_exec'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute prelink in the prelink
-## domain, and allow the specified role
-## the prelink domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`prelink_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `prelink_run'($*)) dnl
-
- gen_require(`
- attribute_role prelink_roles;
- ')
-
- prelink_domtrans($1)
- roleattribute $2 prelink_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `prelink_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Make the specified file type prelinkable.
-##
-##
-##
-## File type to be prelinked.
-##
-##
-#
- define(`prelink_object_file',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `prelink_object_file'($*)) dnl
-
- gen_require(`
- attribute prelink_object;
- ')
-
- typeattribute $1 prelink_object;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `prelink_object_file'($*)) dnl
- ')
-
-
-########################################
-##
-## Read prelink cache files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`prelink_read_cache',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `prelink_read_cache'($*)) dnl
-
- gen_require(`
- type prelink_cache_t;
- ')
-
- files_search_etc($1)
- allow $1 prelink_cache_t:file read_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `prelink_read_cache'($*)) dnl
- ')
-
-
-########################################
-##
-## Delete prelink cache files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`prelink_delete_cache',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `prelink_delete_cache'($*)) dnl
-
- gen_require(`
- type prelink_cache_t;
- ')
-
- files_rw_etc_dirs($1)
- allow $1 prelink_cache_t:file delete_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `prelink_delete_cache'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## prelink log files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`prelink_manage_log',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `prelink_manage_log'($*)) dnl
-
- gen_require(`
- type prelink_log_t;
- ')
-
- logging_search_logs($1)
- manage_files_pattern($1, prelink_log_t, prelink_log_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `prelink_manage_log'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## prelink var_lib files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`prelink_manage_lib',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `prelink_manage_lib'($*)) dnl
-
- gen_require(`
- type prelink_var_lib_t;
- ')
-
- files_search_var_lib($1)
- manage_files_pattern($1, prelink_var_lib_t, prelink_var_lib_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `prelink_manage_lib'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel from prelink lib files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`prelink_relabelfrom_lib',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `prelink_relabelfrom_lib'($*)) dnl
-
- gen_require(`
- type prelink_var_lib_t;
- ')
-
- files_search_var_lib($1)
- relabelfrom_files_pattern($1, prelink_var_lib_t, prelink_var_lib_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `prelink_relabelfrom_lib'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel prelink lib files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`prelink_relabel_lib',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `prelink_relabel_lib'($*)) dnl
-
- gen_require(`
- type prelink_var_lib_t;
- ')
-
- files_search_var_lib($1)
- relabel_files_pattern($1, prelink_var_lib_t, prelink_var_lib_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `prelink_relabel_lib'($*)) dnl
- ')
-
-## ddcprobe retrieves monitor and graphics card information.
-
-########################################
-##
-## Execute ddcprobe in the ddcprobe domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`ddcprobe_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `ddcprobe_domtrans'($*)) dnl
-
- gen_require(`
- type ddcprobe_t, ddcprobe_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, ddcprobe_exec_t, ddcprobe_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `ddcprobe_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute ddcprobe in the ddcprobe
-## domain, and allow the specified
-## role the ddcprobe domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`ddcprobe_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `ddcprobe_run'($*)) dnl
-
- gen_require(`
- attribute_role ddcprobe_roles;
- ')
-
- ddcprobe_domtrans($1)
- roleattribute $2 ddcprobe_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `ddcprobe_run'($*)) dnl
- ')
-
-## System-config-kdump GUI.
-## Tool to manage Bluetooth devices.
-
-########################################
-##
-## Execute blueman in the blueman domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`blueman_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `blueman_domtrans'($*)) dnl
-
- gen_require(`
- type blueman_t, blueman_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, blueman_exec_t, blueman_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `blueman_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive messages from
-## blueman over dbus.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`blueman_dbus_chat',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `blueman_dbus_chat'($*)) dnl
-
- gen_require(`
- type blueman_t;
- class dbus send_msg;
- ')
-
- allow $1 blueman_t:dbus send_msg;
- allow blueman_t $1:dbus send_msg;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `blueman_dbus_chat'($*)) dnl
- ')
-
-
-########################################
-##
-## Search blueman lib directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`blueman_search_lib',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `blueman_search_lib'($*)) dnl
-
- gen_require(`
- type blueman_var_lib_t;
- ')
-
- allow $1 blueman_var_lib_t:dir search_dir_perms;
- files_search_var_lib($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `blueman_search_lib'($*)) dnl
- ')
-
-
-########################################
-##
-## Read blueman lib files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`blueman_read_lib_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `blueman_read_lib_files'($*)) dnl
-
- gen_require(`
- type blueman_var_lib_t;
- ')
-
- files_search_var_lib($1)
- read_files_pattern($1, blueman_var_lib_t, blueman_var_lib_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `blueman_read_lib_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## blueman lib files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`blueman_manage_lib_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `blueman_manage_lib_files'($*)) dnl
-
- gen_require(`
- type blueman_var_lib_t;
- ')
-
- files_search_var_lib($1)
- manage_files_pattern($1, blueman_var_lib_t, blueman_var_lib_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `blueman_manage_lib_files'($*)) dnl
- ')
-
-## File system quota management.
-
-########################################
-##
-## Execute quota management tools in the quota domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`quota_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `quota_domtrans'($*)) dnl
-
- gen_require(`
- type quota_t, quota_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, quota_exec_t, quota_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `quota_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute quota management tools in
-## the quota domain, and allow the
-## specified role the quota domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`quota_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `quota_run'($*)) dnl
-
- gen_require(`
- attribute_role quota_roles;
- ')
-
- quota_domtrans($1)
- roleattribute $2 quota_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `quota_run'($*)) dnl
- ')
-
-
-#######################################
-##
-## Execute quota nld in the quota nld domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`quota_domtrans_nld',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `quota_domtrans_nld'($*)) dnl
-
- gen_require(`
- type quota_nld_t, quota_nld_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, quota_nld_exec_t, quota_nld_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `quota_domtrans_nld'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## quota db files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`quota_manage_db_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `quota_manage_db_files'($*)) dnl
-
- gen_require(`
- type quota_db_t;
- ')
-
- allow $1 quota_db_t:file manage_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `quota_manage_db_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Create specified objects in specified
-## directories with a type transition to
-## the quota db file type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Directory to transition on.
-##
-##
-##
-##
-## The object class of the object being created.
-##
-##
-##
-##
-## The name of the object being created.
-##
-##
-#
- define(`quota_spec_filetrans_db',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `quota_spec_filetrans_db'($*)) dnl
-
- gen_require(`
- type quota_db_t;
- ')
-
- filetrans_pattern($1, $2, quota_db_t, $3, $4)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `quota_spec_filetrans_db'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to get attributes
-## of filesystem quota data files.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`quota_dontaudit_getattr_db',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `quota_dontaudit_getattr_db'($*)) dnl
-
- gen_require(`
- type quota_db_t;
- ')
-
- dontaudit $1 quota_db_t:file getattr_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `quota_dontaudit_getattr_db'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## quota flag files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`quota_manage_flags',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `quota_manage_flags'($*)) dnl
-
- gen_require(`
- type quota_flag_t;
- ')
-
- files_search_var_lib($1)
- manage_files_pattern($1, quota_flag_t, quota_flag_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `quota_manage_flags'($*)) dnl
- ')
-
-
-########################################
-##
-## All of the rules required to
-## administrate an quota environment.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`quota_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `quota_admin'($*)) dnl
-
- gen_require(`
- type quota_nld_t, quota_t, quota_db_t;
- type quota_nld_initrc_exec_t, quota_flag_t, quota_nld_runtime_t;
- ')
-
- allow $1 { quota_nld_t quota_t }:process { ptrace signal_perms };
- ps_process_pattern($1, { quota_nld_t quota_t })
-
- init_startstop_service($1, $2, quota_nld_t, quota_nld_initrc_exec_t)
-
- files_list_all($1)
- admin_pattern($1, { quota_db_t quota_flag_t quota_nld_runtime_t })
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `quota_admin'($*)) dnl
- ')
-
-## Virtual Private Networking client.
-
-########################################
-##
-## Execute vpn clients in the vpnc domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`vpn_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `vpn_domtrans'($*)) dnl
-
- gen_require(`
- type vpnc_t, vpnc_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, vpnc_exec_t, vpnc_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `vpn_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute vpn clients in the vpnc
-## domain, and allow the specified
-## role the vpnc domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`vpn_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `vpn_run'($*)) dnl
-
- gen_require(`
- attribute_role vpnc_roles;
- ')
-
- vpn_domtrans($1)
- roleattribute $2 vpnc_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `vpn_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Send kill signals to vpnc.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`vpn_kill',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `vpn_kill'($*)) dnl
-
- gen_require(`
- type vpnc_t;
- ')
-
- allow $1 vpnc_t:process sigkill;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `vpn_kill'($*)) dnl
- ')
-
-
-########################################
-##
-## Send generic signals to vpnc.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`vpn_signal',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `vpn_signal'($*)) dnl
-
- gen_require(`
- type vpnc_t;
- ')
-
- allow $1 vpnc_t:process signal;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `vpn_signal'($*)) dnl
- ')
-
-
-########################################
-##
-## Send null signals to vpnc.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`vpn_signull',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `vpn_signull'($*)) dnl
-
- gen_require(`
- type vpnc_t;
- ')
-
- allow $1 vpnc_t:process signull;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `vpn_signull'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive messages from
-## vpnc over dbus.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`vpn_dbus_chat',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `vpn_dbus_chat'($*)) dnl
-
- gen_require(`
- type vpnc_t;
- class dbus send_msg;
- ')
-
- allow $1 vpnc_t:dbus send_msg;
- allow vpnc_t $1:dbus send_msg;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `vpn_dbus_chat'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabelfrom from vpnc socket.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`vpn_relabelfrom_tun_socket',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `vpn_relabelfrom_tun_socket'($*)) dnl
-
- gen_require(`
- type vpnc_t;
- ')
-
- allow $1 vpnc_t:tun_socket relabelfrom;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `vpn_relabelfrom_tun_socket'($*)) dnl
- ')
-
-## Set up, mount/unmount, and delete an swap file.
-
-########################################
-##
-## Dontaudit acces to the swap file.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`dphysswapfile_dontaudit_read_swap',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dphysswapfile_dontaudit_read_swap'($*)) dnl
-
- refpolicywarn(`$0($*) has been deprecated')
-
- gen_require(`
- type dphysswapfile_swap_t;
- ')
-
- dontaudit $1 dphysswapfile_swap_t:file read_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dphysswapfile_dontaudit_read_swap'($*)) dnl
- ')
-
-
-########################################
-##
-## All of the rules required to
-## administrate an dphys-swapfile environment.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`dphysswapfile_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dphysswapfile_admin'($*)) dnl
-
- gen_require(`
- type dphysswapfile_t, dphysswapfile_conf_t;
- type dphysswapfile_initrc_exec_t, dphysswapfile_unit_t;
- ')
-
- admin_process_pattern($1, dphysswapfile_t)
-
- init_startstop_service($1, $2, dphysswapfile_t, dphysswapfile_initrc_exec_t, dphysswapfile_unit_t)
-
- files_search_etc($1)
- admin_pattern($1, dphysswapfile_conf_t)
-
- # do not grant access to swap file for now
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dphysswapfile_admin'($*)) dnl
- ')
-
-## rkhunter - rootkit checker.
-
-########################################
-##
-## Execute a domain transition to run rkhunter.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`rkhunter_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rkhunter_domtrans'($*)) dnl
-
- gen_require(`
- type rkhunter_t, rkhunter_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, rkhunter_exec_t, rkhunter_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rkhunter_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute rkhunter in the rkhunter domain,
-## and allow the specified role
-## the rkhunter domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`rkhunter_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rkhunter_run'($*)) dnl
-
- gen_require(`
- attribute_role rkhunter_roles;
- ')
-
- rkhunter_domtrans($1)
- roleattribute $2 rkhunter_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rkhunter_run'($*)) dnl
- ')
-
-## chkrootkit - rootkit checker.
-
-########################################
-##
-## Execute a domain transition to run chkrootkit.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`chkrootkit_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `chkrootkit_domtrans'($*)) dnl
-
- gen_require(`
- type chkrootkit_t, chkrootkit_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, chkrootkit_exec_t, chkrootkit_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `chkrootkit_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute chkrootkit in the chkrootkit domain,
-## and allow the specified role
-## the chkrootkit domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`chkrootkit_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `chkrootkit_run'($*)) dnl
-
- gen_require(`
- attribute_role chkrootkit_roles;
- ')
-
- chkrootkit_domtrans($1)
- roleattribute $2 chkrootkit_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `chkrootkit_run'($*)) dnl
- ')
-
-## Redhat package manager.
-
-########################################
-##
-## Execute rpm in the rpm domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`rpm_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_domtrans'($*)) dnl
-
- gen_require(`
- type rpm_t, rpm_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, rpm_exec_t, rpm_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute debuginfo install
-## in the rpm domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`rpm_debuginfo_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_debuginfo_domtrans'($*)) dnl
-
- gen_require(`
- type rpm_t, debuginfo_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, debuginfo_exec_t, rpm_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_debuginfo_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute rpm scripts in the rpm script domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`rpm_domtrans_script',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_domtrans_script'($*)) dnl
-
- gen_require(`
- type rpm_script_t;
- ')
-
- corecmd_shell_domtrans($1, rpm_script_t)
-
- allow rpm_script_t $1:fd use;
- allow rpm_script_t $1:fifo_file rw_fifo_file_perms;
- allow rpm_script_t $1:process sigchld;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_domtrans_script'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute rpm in the rpm domain,
-## and allow the specified roles the
-## rpm domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`rpm_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_run'($*)) dnl
-
- gen_require(`
- attribute_role rpm_roles;
- ')
-
- rpm_domtrans($1)
- roleattribute $2 rpm_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute the rpm in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`rpm_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_exec'($*)) dnl
-
- gen_require(`
- type rpm_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, rpm_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_exec'($*)) dnl
- ')
-
-
-########################################
-##
-## Send null signals to rpm.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`rpm_signull',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_signull'($*)) dnl
-
- gen_require(`
- type rpm_t;
- ')
-
- allow $1 rpm_t:process signull;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_signull'($*)) dnl
- ')
-
-
-########################################
-##
-## Inherit and use file descriptors from rpm.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`rpm_use_fds',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_use_fds'($*)) dnl
-
- gen_require(`
- type rpm_t;
- ')
-
- allow $1 rpm_t:fd use;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_use_fds'($*)) dnl
- ')
-
-
-########################################
-##
-## Read rpm unnamed pipes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`rpm_read_pipes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_read_pipes'($*)) dnl
-
- gen_require(`
- type rpm_t;
- ')
-
- allow $1 rpm_t:fifo_file read_fifo_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_read_pipes'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write rpm unnamed pipes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`rpm_rw_pipes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_rw_pipes'($*)) dnl
-
- gen_require(`
- type rpm_t;
- ')
-
- allow $1 rpm_t:fifo_file rw_fifo_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_rw_pipes'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive messages from
-## rpm over dbus.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`rpm_dbus_chat',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_dbus_chat'($*)) dnl
-
- gen_require(`
- type rpm_t;
- class dbus send_msg;
- ')
-
- allow $1 rpm_t:dbus send_msg;
- allow rpm_t $1:dbus send_msg;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_dbus_chat'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and
-## receive messages from rpm over dbus.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`rpm_dontaudit_dbus_chat',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_dontaudit_dbus_chat'($*)) dnl
-
- gen_require(`
- type rpm_t;
- class dbus send_msg;
- ')
-
- dontaudit $1 rpm_t:dbus send_msg;
- dontaudit rpm_t $1:dbus send_msg;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_dontaudit_dbus_chat'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive messages from
-## rpm script over dbus.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`rpm_script_dbus_chat',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_script_dbus_chat'($*)) dnl
-
- gen_require(`
- type rpm_script_t;
- class dbus send_msg;
- ')
-
- allow $1 rpm_script_t:dbus send_msg;
- allow rpm_script_t $1:dbus send_msg;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_script_dbus_chat'($*)) dnl
- ')
-
-
-########################################
-##
-## Search rpm log directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`rpm_search_log',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_search_log'($*)) dnl
-
- gen_require(`
- type rpm_log_t;
- ')
-
- logging_search_logs($1)
- allow $1 rpm_log_t:dir search_dir_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_search_log'($*)) dnl
- ')
-
-
-#####################################
-##
-## Append rpm log files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`rpm_append_log',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_append_log'($*)) dnl
-
- gen_require(`
- type rpm_log_t;
- ')
-
- logging_search_logs($1)
- append_files_pattern($1, rpm_log_t, rpm_log_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_append_log'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## rpm log files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`rpm_manage_log',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_manage_log'($*)) dnl
-
- gen_require(`
- type rpm_log_t;
- ')
-
- logging_rw_generic_log_dirs($1)
- allow $1 rpm_log_t:file manage_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_manage_log'($*)) dnl
- ')
-
-
-########################################
-##
-## Inherit and use rpm script file descriptors.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`rpm_use_script_fds',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_use_script_fds'($*)) dnl
-
- gen_require(`
- type rpm_script_t;
- ')
-
- allow $1 rpm_script_t:fd use;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_use_script_fds'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## rpm script temporary files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`rpm_manage_script_tmp_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_manage_script_tmp_files'($*)) dnl
-
- gen_require(`
- type rpm_script_tmp_t;
- ')
-
- files_search_tmp($1)
- manage_files_pattern($1, rpm_script_tmp_t, rpm_script_tmp_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_manage_script_tmp_files'($*)) dnl
- ')
-
-
-#####################################
-##
-## Append rpm temporary files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`rpm_append_tmp_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_append_tmp_files'($*)) dnl
-
- gen_require(`
- type rpm_tmp_t;
- ')
-
- files_search_tmp($1)
- append_files_pattern($1, rpm_tmp_t, rpm_tmp_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_append_tmp_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## rpm temporary files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`rpm_manage_tmp_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_manage_tmp_files'($*)) dnl
-
- gen_require(`
- type rpm_tmp_t;
- ')
-
- files_search_tmp($1)
- manage_files_pattern($1, rpm_tmp_t, rpm_tmp_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_manage_tmp_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Read rpm script temporary files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`rpm_read_script_tmp_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_read_script_tmp_files'($*)) dnl
-
- gen_require(`
- type rpm_script_tmp_t;
- ')
-
- files_search_tmp($1)
- read_files_pattern($1, rpm_script_tmp_t, rpm_script_tmp_t)
- read_lnk_files_pattern($1, rpm_script_tmp_t, rpm_script_tmp_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_read_script_tmp_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Read rpm cache content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`rpm_read_cache',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_read_cache'($*)) dnl
-
- gen_require(`
- type rpm_var_cache_t;
- ')
-
- files_search_var($1)
- allow $1 rpm_var_cache_t:dir list_dir_perms;
- read_files_pattern($1, rpm_var_cache_t, rpm_var_cache_t)
- read_lnk_files_pattern($1, rpm_var_cache_t, rpm_var_cache_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_read_cache'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## rpm cache content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`rpm_manage_cache',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_manage_cache'($*)) dnl
-
- gen_require(`
- type rpm_var_cache_t;
- ')
-
- files_search_var_lib($1)
- manage_dirs_pattern($1, rpm_var_cache_t, rpm_var_cache_t)
- manage_files_pattern($1, rpm_var_cache_t, rpm_var_cache_t)
- manage_lnk_files_pattern($1, rpm_var_cache_t, rpm_var_cache_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_manage_cache'($*)) dnl
- ')
-
-
-########################################
-##
-## Read rpm lib content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`rpm_read_db',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_read_db'($*)) dnl
-
- gen_require(`
- type rpm_var_lib_t;
- ')
-
- files_search_var_lib($1)
- allow $1 rpm_var_lib_t:dir list_dir_perms;
- read_files_pattern($1, rpm_var_lib_t, rpm_var_lib_t)
- read_lnk_files_pattern($1, rpm_var_lib_t, rpm_var_lib_t)
- allow $1 rpm_var_lib_t:file map;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_read_db'($*)) dnl
- ')
-
-
-########################################
-##
-## Delete rpm lib files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`rpm_delete_db',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_delete_db'($*)) dnl
-
- gen_require(`
- type rpm_var_lib_t;
- ')
-
- files_search_var_lib($1)
- delete_files_pattern($1, rpm_var_lib_t, rpm_var_lib_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_delete_db'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## rpm lib files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`rpm_manage_db',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_manage_db'($*)) dnl
-
- gen_require(`
- type rpm_var_lib_t;
- ')
-
- files_search_var_lib($1)
- manage_files_pattern($1, rpm_var_lib_t, rpm_var_lib_t)
- manage_lnk_files_pattern($1, rpm_var_lib_t, rpm_var_lib_t)
- allow $1 rpm_var_lib_t:file map;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_manage_db'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to create, read,
-## write, and delete rpm lib content.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`rpm_dontaudit_manage_db',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_dontaudit_manage_db'($*)) dnl
-
- gen_require(`
- type rpm_var_lib_t;
- ')
-
- dontaudit $1 rpm_var_lib_t:dir rw_dir_perms;
- dontaudit $1 rpm_var_lib_t:file manage_file_perms;
- dontaudit $1 rpm_var_lib_t:lnk_file manage_lnk_file_perms;
- dontaudit $1 rpm_var_lib_t:file map;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_dontaudit_manage_db'($*)) dnl
- ')
-
-
-#####################################
-##
-## Read rpm pid files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`rpm_read_pid_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_read_pid_files'($*)) dnl
-
- gen_require(`
- type rpm_runtime_t;
- ')
-
- read_files_pattern($1, rpm_runtime_t, rpm_runtime_t)
- files_search_pids($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_read_pid_files'($*)) dnl
- ')
-
-
-#####################################
-##
-## Create, read, write, and delete
-## rpm pid files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`rpm_manage_pid_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_manage_pid_files'($*)) dnl
-
- gen_require(`
- type rpm_runtime_t;
- ')
-
- manage_files_pattern($1, rpm_runtime_t, rpm_runtime_t)
- files_search_pids($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_manage_pid_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Create specified objects in pid directories
-## with the rpm pid file type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Class of the object being created.
-##
-##
-##
-##
-## The name of the object being created.
-##
-##
-#
- define(`rpm_pid_filetrans_rpm_pid',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_pid_filetrans_rpm_pid'($*)) dnl
-
- gen_require(`
- type rpm_runtime_t;
- ')
-
- files_pid_filetrans($1, rpm_runtime_t, $3, $4)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_pid_filetrans_rpm_pid'($*)) dnl
- ')
-
-
-########################################
-##
-## All of the rules required to
-## administrate an rpm environment.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`rpm_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rpm_admin'($*)) dnl
-
- gen_require(`
- type rpm_t, rpm_script_t, rpm_initrc_exec_t;
- type rpm_var_cache_t, rpm_var_lib_t, rpm_lock_t;
- type rpm_log_t, rpm_tmpfs_t, rpm_tmp_t, rpm_runtime_t;
- type rpm_script_tmp_t, rpm_script_tmpfs_t, rpm_file_t;
- ')
-
- allow $1 { rpm_t rpm_script_t }:process { ptrace signal_perms };
- ps_process_pattern($1, { rpm_t rpm_script_t })
-
- init_startstop_service($1, $2, rpm_t, rpm_initrc_exec_t)
-
- admin_pattern($1, rpm_file_t)
-
- files_list_var($1)
- admin_pattern($1, rpm_var_cache_t)
-
- files_list_tmp($1)
- admin_pattern($1, { rpm_tmp_t rpm_script_tmp_t })
-
- files_list_var_lib($1)
- admin_pattern($1, rpm_var_lib_t)
-
- files_search_locks($1)
- admin_pattern($1, rpm_lock_t)
-
- logging_list_logs($1)
- admin_pattern($1, rpm_log_t)
-
- files_list_pids($1)
- admin_pattern($1, rpm_runtime_t)
-
- fs_search_tmpfs($1)
- admin_pattern($1, { rpm_tmpfs_t rpm_script_tmpfs_t })
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rpm_admin'($*)) dnl
- ')
-
-## Hardware detection and configuration tools.
-
-########################################
-##
-## Execute kudzu in the kudzu domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`kudzu_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kudzu_domtrans'($*)) dnl
-
- gen_require(`
- type kudzu_t, kudzu_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, kudzu_exec_t, kudzu_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kudzu_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute kudzu in the kudzu domain, and
-## allow the specified role the kudzu domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`kudzu_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kudzu_run'($*)) dnl
-
- gen_require(`
- attribute_role kudzu_roles;
- ')
-
- kudzu_domtrans($1)
- roleattribute $2 kudzu_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kudzu_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Get attributes of kudzu executable files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kudzu_getattr_exec_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kudzu_getattr_exec_files'($*)) dnl
-
- gen_require(`
- type kudzu_exec_t;
- ')
-
- allow $1 kudzu_exec_t:file getattr_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kudzu_getattr_exec_files'($*)) dnl
- ')
-
-
-########################################
-##
-## All of the rules required to
-## administrate an kudzu environment.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`kudzu_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kudzu_admin'($*)) dnl
-
- gen_require(`
- type kudzu_t, kudzu_initrc_exec_t, kudzu_runtime_t;
- type kudzu_tmp_t;
- ')
-
- allow $1 kudzu_t:process { ptrace signal_perms };
- ps_process_pattern($1, kudzu_t)
-
- init_startstop_service($1, $2, kudzu_t, kudzu_initrc_exec_t)
-
- files_search_tmp($1)
- admin_pattern($1, kudzu_tmp_t)
-
- files_search_pids($1)
- admin_pattern($1, kudzu_runtime_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kudzu_admin'($*)) dnl
- ')
-
-## configuration management suite.
-
-########################################
-##
-## Execute bcfg2 in the bcfg2 domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`bcfg2_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `bcfg2_domtrans'($*)) dnl
-
- gen_require(`
- type bcfg2_t, bcfg2_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, bcfg2_exec_t, bcfg2_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `bcfg2_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute bcfg2 server in the bcfg2 domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`bcfg2_initrc_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `bcfg2_initrc_domtrans'($*)) dnl
-
- gen_require(`
- type bcfg2_initrc_exec_t;
- ')
-
- init_labeled_script_domtrans($1, bcfg2_initrc_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `bcfg2_initrc_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Search bcfg2 lib directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`bcfg2_search_lib',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `bcfg2_search_lib'($*)) dnl
-
- gen_require(`
- type bcfg2_var_lib_t;
- ')
-
- allow $1 bcfg2_var_lib_t:dir search_dir_perms;
- files_search_var_lib($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `bcfg2_search_lib'($*)) dnl
- ')
-
-
-########################################
-##
-## Read bcfg2 lib files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`bcfg2_read_lib_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `bcfg2_read_lib_files'($*)) dnl
-
- gen_require(`
- type bcfg2_var_lib_t;
- ')
-
- files_search_var_lib($1)
- read_files_pattern($1, bcfg2_var_lib_t, bcfg2_var_lib_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `bcfg2_read_lib_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## bcfg2 lib files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`bcfg2_manage_lib_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `bcfg2_manage_lib_files'($*)) dnl
-
- gen_require(`
- type bcfg2_var_lib_t;
- ')
-
- files_search_var_lib($1)
- manage_files_pattern($1, bcfg2_var_lib_t, bcfg2_var_lib_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `bcfg2_manage_lib_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## bcfg2 lib directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`bcfg2_manage_lib_dirs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `bcfg2_manage_lib_dirs'($*)) dnl
-
- gen_require(`
- type bcfg2_var_lib_t;
- ')
-
- files_search_var_lib($1)
- manage_dirs_pattern($1, bcfg2_var_lib_t, bcfg2_var_lib_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `bcfg2_manage_lib_dirs'($*)) dnl
- ')
-
-
-########################################
-##
-## All of the rules required to
-## administrate an bcfg2 environment.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`bcfg2_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `bcfg2_admin'($*)) dnl
-
- gen_require(`
- type bcfg2_t, bcfg2_initrc_exec_t, bcfg2_var_lib_t;
- type bcfg2_runtime_t;
- ')
-
- allow $1 bcfg2_t:process { ptrace signal_perms };
- ps_process_pattern($1, bcfg2_t)
-
- init_startstop_service($1, $2, bcfg2_t, bcfg2_initrc_exec_t)
-
- files_search_pids($1)
- admin_pattern($1, bcfg2_runtime_t)
-
- files_search_var_lib($1)
- admin_pattern($1, bcfg2_var_lib_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `bcfg2_admin'($*)) dnl
- ')
-
-## Network traffic graphing.
-
-########################################
-##
-## Read mrtg configuration
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`mrtg_read_config',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mrtg_read_config'($*)) dnl
-
- gen_require(`
- type mrtg_etc_t;
- ')
-
- allow $1 mrtg_etc_t:file read_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mrtg_read_config'($*)) dnl
- ')
-
-
-########################################
-##
-## Create and append mrtg log files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`mrtg_append_create_logs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mrtg_append_create_logs'($*)) dnl
-
- gen_require(`
- type mrtg_log_t;
- ')
-
- logging_search_logs($1)
- append_files_pattern($1, mrtg_log_t, mrtg_log_t)
- create_files_pattern($1, mrtg_log_t, mrtg_log_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mrtg_append_create_logs'($*)) dnl
- ')
-
-
-########################################
-##
-## All of the rules required to
-## administrate an mrtg environment.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`mrtg_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mrtg_admin'($*)) dnl
-
- gen_require(`
- type mrtg_t, mrtg_runtime_t, mrtg_initrc_exec_t;
- type mrtg_var_lib_t, mrtg_lock_t, mrtg_log_t;
- type mrtg_etc_t;
- ')
-
- allow $1 mrtg_t:process { ptrace signal_perms };
- ps_process_pattern($1, mrtg_t)
-
- init_startstop_service($1, $2, mrtg_t, mrtg_initrc_exec_t)
-
- files_search_etc($1)
- admin_pattern($1, mrtg_etc_t)
-
- files_search_locks($1)
- admin_pattern($1, mrtg_lock_t)
-
- logging_search_logs($1)
- admin_pattern($1, mrtg_log_t)
-
- files_search_pids($1)
- admin_pattern($1, mrtg_runtime_t)
-
- files_search_var_lib($1)
- admin_pattern($1, mrtg_var_lib_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mrtg_admin'($*)) dnl
- ')
-
-## Shoreline Firewall high-level tool for configuring netfilter.
-
-########################################
-##
-## Execute a domain transition to run shorewall.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`shorewall_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `shorewall_domtrans'($*)) dnl
-
- gen_require(`
- type shorewall_t, shorewall_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, shorewall_exec_t, shorewall_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `shorewall_domtrans'($*)) dnl
- ')
-
-
-######################################
-##
-## Execute a domain transition to run shorewall
-## using executables from /var/lib.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`shorewall_lib_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `shorewall_lib_domtrans'($*)) dnl
-
- gen_require(`
- type shorewall_t, shorewall_var_lib_t;
- ')
-
- files_search_var_lib($1)
- domtrans_pattern($1, shorewall_var_lib_t, shorewall_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `shorewall_lib_domtrans'($*)) dnl
- ')
-
-
-#######################################
-##
-## Read shorewall configuration files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`shorewall_read_config',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `shorewall_read_config'($*)) dnl
-
- gen_require(`
- type shorewall_etc_t;
- ')
-
- files_search_etc($1)
- read_files_pattern($1, shorewall_etc_t, shorewall_etc_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `shorewall_read_config'($*)) dnl
- ')
-
-
-#######################################
-##
-## Read shorewall pid files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`shorewall_read_pid_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `shorewall_read_pid_files'($*)) dnl
-
- refpolicywarn(`$0($*) has been deprecated')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `shorewall_read_pid_files'($*)) dnl
- ')
-
-
-#######################################
-##
-## Read and write shorewall pid files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`shorewall_rw_pid_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `shorewall_rw_pid_files'($*)) dnl
-
- refpolicywarn(`$0($*) has been deprecated')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `shorewall_rw_pid_files'($*)) dnl
- ')
-
-
-######################################
-##
-## Read shorewall lib files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`shorewall_read_lib_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `shorewall_read_lib_files'($*)) dnl
-
- gen_require(`
- type shorewall_var_lib_t;
- ')
-
- files_search_var_lib($1)
- read_files_pattern($1, shorewall_var_lib_t, shorewall_var_lib_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `shorewall_read_lib_files'($*)) dnl
- ')
-
-
-#######################################
-##
-## Read and write shorewall lib files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`shorewall_rw_lib_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `shorewall_rw_lib_files'($*)) dnl
-
- gen_require(`
- type shorewall_var_lib_t;
- ')
-
- files_search_var_lib($1)
- rw_files_pattern($1, shorewall_var_lib_t, shorewall_var_lib_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `shorewall_rw_lib_files'($*)) dnl
- ')
-
-
-#######################################
-##
-## Read shorewall temporary files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`shorewall_read_tmp_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `shorewall_read_tmp_files'($*)) dnl
-
- gen_require(`
- type shorewall_tmp_t;
- ')
-
- files_search_tmp($1)
- read_files_pattern($1, shorewall_tmp_t, shorewall_tmp_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `shorewall_read_tmp_files'($*)) dnl
- ')
-
-
-#######################################
-##
-## All of the rules required to
-## administrate an shorewall environment.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`shorewall_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `shorewall_admin'($*)) dnl
-
- gen_require(`
- type shorewall_t, shorewall_lock_t, shorewall_log_t;
- type shorewall_exec_t, shorewall_initrc_exec_t, shorewall_var_lib_t;
- type shorewall_tmp_t, shorewall_etc_t;
- ')
-
- allow $1 shorewall_t:process { ptrace signal_perms };
- ps_process_pattern($1, shorewall_t)
-
- init_startstop_service($1, $2, shorewall_t, shorewall_initrc_exec_t)
-
- can_exec($1, shorewall_exec_t)
-
- files_list_etc($1)
- admin_pattern($1, shorewall_etc_t)
-
- files_list_locks($1)
- admin_pattern($1, shorewall_lock_t)
-
- logging_list_logs($1)
- admin_pattern($1, shorewall_log_t)
-
- files_list_var_lib($1)
- admin_pattern($1, shorewall_var_lib_t)
-
- files_list_tmp($1)
- admin_pattern($1, shorewall_tmp_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `shorewall_admin'($*)) dnl
- ')
-
-## run real-mode video BIOS code to alter hardware state.
-
-########################################
-##
-## Execute vbetool in the vbetool domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`vbetool_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `vbetool_domtrans'($*)) dnl
-
- gen_require(`
- type vbetool_t, vbetool_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, vbetool_exec_t, vbetool_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `vbetool_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute vbetool in the vbetool
-## domain, and allow the specified
-## role the vbetool domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`vbetool_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `vbetool_run'($*)) dnl
-
- gen_require(`
- attribute_role vbetool_roles;
- ')
-
- vbetool_domtrans($1)
- roleattribute $2 vbetool_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `vbetool_run'($*)) dnl
- ')
-
-## Debian package manager.
-
-########################################
-##
-## Execute dpkg programs in the dpkg domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`dpkg_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dpkg_domtrans'($*)) dnl
-
- gen_require(`
- type dpkg_t, dpkg_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, dpkg_exec_t, dpkg_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dpkg_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Transition to dpkg_t when NNP has been set
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`dpkg_nnp_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dpkg_nnp_domtrans'($*)) dnl
-
- gen_require(`
- type dpkg_t;
- ')
-
- dpkg_domtrans($1)
- allow $1 dpkg_t:process2 nnp_transition;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dpkg_nnp_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute dpkg programs in the dpkg domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`dpkg_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dpkg_run'($*)) dnl
-
- gen_require(`
- attribute_role dpkg_roles;
- ')
-
- dpkg_domtrans($1)
- roleattribute $2 dpkg_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dpkg_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute the dkpg in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`dpkg_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dpkg_exec'($*)) dnl
-
- gen_require(`
- type dpkg_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, dpkg_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dpkg_exec'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute dpkg_script programs in
-## the dpkg_script domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`dpkg_domtrans_script',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dpkg_domtrans_script'($*)) dnl
-
- gen_require(`
- type dpkg_script_t;
- ')
-
- corecmd_shell_domtrans($1, dpkg_script_t)
- allow dpkg_script_t $1:fd use;
- allow dpkg_script_t $1:fifo_file rw_file_perms;
- allow dpkg_script_t $1:process sigchld;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dpkg_domtrans_script'($*)) dnl
- ')
-
-
-########################################
-##
-## access dpkg_script fifos
-##
-##
-##
-## Domain allowed access
-##
-##
-#
- define(`dpkg_script_rw_pipes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dpkg_script_rw_pipes'($*)) dnl
-
- gen_require(`
- type dpkg_script_t;
- ')
-
- allow $1 dpkg_script_t:fd use;
- allow $1 dpkg_script_t:fifo_file rw_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dpkg_script_rw_pipes'($*)) dnl
- ')
-
-
-########################################
-##
-## Inherit and use file descriptors from dpkg.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`dpkg_use_fds',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dpkg_use_fds'($*)) dnl
-
- gen_require(`
- type dpkg_t;
- ')
-
- allow $1 dpkg_t:fd use;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dpkg_use_fds'($*)) dnl
- ')
-
-
-########################################
-##
-## Read from unnamed dpkg pipes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`dpkg_read_pipes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dpkg_read_pipes'($*)) dnl
-
- gen_require(`
- type dpkg_t;
- ')
-
- allow $1 dpkg_t:fifo_file read_fifo_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dpkg_read_pipes'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write unnamed dpkg pipes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`dpkg_rw_pipes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dpkg_rw_pipes'($*)) dnl
-
- gen_require(`
- type dpkg_t;
- ')
-
- allow $1 dpkg_t:fifo_file rw_fifo_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dpkg_rw_pipes'($*)) dnl
- ')
-
-
-########################################
-##
-## Inherit and use file descriptors
-## from dpkg scripts.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`dpkg_use_script_fds',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dpkg_use_script_fds'($*)) dnl
-
- gen_require(`
- type dpkg_script_t;
- ')
-
- allow $1 dpkg_script_t:fd use;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dpkg_use_script_fds'($*)) dnl
- ')
-
-
-########################################
-##
-## Inherit and use file descriptors
-## from dpkg scripts.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`dpkg_script_rw_inherited_pipes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dpkg_script_rw_inherited_pipes'($*)) dnl
-
- gen_require(`
- type dpkg_script_t;
- ')
-
- allow $1 dpkg_script_t:fd use;
- allow $1 dpkg_script_t:fifo_file rw_inherited_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dpkg_script_rw_inherited_pipes'($*)) dnl
- ')
-
-
-########################################
-##
-## Read dpkg package database content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`dpkg_read_db',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dpkg_read_db'($*)) dnl
-
- gen_require(`
- type dpkg_var_lib_t;
- ')
-
- files_search_var_lib($1)
- allow $1 dpkg_var_lib_t:dir list_dir_perms;
- read_files_pattern($1, dpkg_var_lib_t, dpkg_var_lib_t)
- read_lnk_files_pattern($1, dpkg_var_lib_t, dpkg_var_lib_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dpkg_read_db'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## dpkg package database content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`dpkg_manage_db',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dpkg_manage_db'($*)) dnl
-
- gen_require(`
- type dpkg_var_lib_t;
- ')
-
- files_search_var_lib($1)
- manage_files_pattern($1, dpkg_var_lib_t, dpkg_var_lib_t)
- manage_lnk_files_pattern($1, dpkg_var_lib_t, dpkg_var_lib_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dpkg_manage_db'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to create,
-## read, write, and delete dpkg
-## package database content.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`dpkg_dontaudit_manage_db',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dpkg_dontaudit_manage_db'($*)) dnl
-
- gen_require(`
- type dpkg_var_lib_t;
- ')
-
- dontaudit $1 dpkg_var_lib_t:dir rw_dir_perms;
- dontaudit $1 dpkg_var_lib_t:file manage_file_perms;
- dontaudit $1 dpkg_var_lib_t:lnk_file manage_lnk_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dpkg_dontaudit_manage_db'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## dpkg lock files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`dpkg_lock_db',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dpkg_lock_db'($*)) dnl
-
- gen_require(`
- type dpkg_lock_t, dpkg_var_lib_t;
- ')
-
- files_search_var_lib($1)
- allow $1 dpkg_var_lib_t:dir list_dir_perms;
- allow $1 dpkg_lock_t:file manage_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dpkg_lock_db'($*)) dnl
- ')
-
-
-########################################
-##
-## manage dpkg_script_tmp_t files and dirs
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`dpkg_manage_script_tmp_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dpkg_manage_script_tmp_files'($*)) dnl
-
- gen_require(`
- type dpkg_script_tmp_t;
- ')
-
- files_search_tmp($1)
- allow $1 dpkg_script_tmp_t:dir manage_dir_perms;
- allow $1 dpkg_script_tmp_t:file manage_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dpkg_manage_script_tmp_files'($*)) dnl
- ')
-
-
-########################################
-##
-## map dpkg_script_tmp_t files
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`dpkg_map_script_tmp_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dpkg_map_script_tmp_files'($*)) dnl
-
- gen_require(`
- type dpkg_script_tmp_t;
- ')
-
- allow $1 dpkg_script_tmp_t:file map;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dpkg_map_script_tmp_files'($*)) dnl
- ')
-
-
-########################################
-##
-## read dpkg_script_tmp_t links
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`dpkg_read_script_tmp_symlinks',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dpkg_read_script_tmp_symlinks'($*)) dnl
-
- gen_require(`
- type dpkg_script_tmp_t;
- ')
-
- allow $1 dpkg_script_tmp_t:lnk_file read_lnk_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dpkg_read_script_tmp_symlinks'($*)) dnl
- ')
-
-## Advanced package tool.
-
-########################################
-##
-## Execute apt programs in the apt domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`apt_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `apt_domtrans'($*)) dnl
-
- gen_require(`
- type apt_t, apt_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, apt_exec_t, apt_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `apt_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute the apt in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`apt_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `apt_exec'($*)) dnl
-
- gen_require(`
- type apt_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, apt_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `apt_exec'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute apt programs in the apt domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`apt_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `apt_run'($*)) dnl
-
- gen_require(`
- attribute_role apt_roles;
- ')
-
- apt_domtrans($1)
- roleattribute $2 apt_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `apt_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Use apt file descriptors.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`apt_use_fds',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `apt_use_fds'($*)) dnl
-
- gen_require(`
- type apt_t;
- ')
-
- allow $1 apt_t:fd use;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `apt_use_fds'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to use
-## apt file descriptors.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`apt_dontaudit_use_fds',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `apt_dontaudit_use_fds'($*)) dnl
-
- gen_require(`
- type apt_t;
- ')
-
- dontaudit $1 apt_t:fd use;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `apt_dontaudit_use_fds'($*)) dnl
- ')
-
-
-########################################
-##
-## Read apt unnamed pipes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`apt_read_pipes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `apt_read_pipes'($*)) dnl
-
- gen_require(`
- type apt_t;
- ')
-
- allow $1 apt_t:fifo_file read_fifo_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `apt_read_pipes'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write apt unnamed pipes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`apt_rw_pipes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `apt_rw_pipes'($*)) dnl
-
- gen_require(`
- type apt_t;
- ')
-
- allow $1 apt_t:fifo_file rw_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `apt_rw_pipes'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write apt ptys.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`apt_use_ptys',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `apt_use_ptys'($*)) dnl
-
- gen_require(`
- type apt_devpts_t;
- ')
-
- allow $1 apt_devpts_t:chr_file rw_term_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `apt_use_ptys'($*)) dnl
- ')
-
-
-########################################
-##
-## Read apt package cache content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`apt_read_cache',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `apt_read_cache'($*)) dnl
-
- gen_require(`
- type apt_var_cache_t;
- ')
-
- files_search_var($1)
- allow $1 apt_var_cache_t:dir list_dir_perms;
- allow $1 apt_var_cache_t:file mmap_read_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `apt_read_cache'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete apt package cache content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`apt_manage_cache',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `apt_manage_cache'($*)) dnl
-
- gen_require(`
- type apt_var_cache_t;
- ')
-
- files_search_var($1)
- allow $1 apt_var_cache_t:dir manage_dir_perms;
- allow $1 apt_var_cache_t:file { manage_file_perms map };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `apt_manage_cache'($*)) dnl
- ')
-
-
-########################################
-##
-## Read apt package database content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`apt_read_db',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `apt_read_db'($*)) dnl
-
- gen_require(`
- type apt_var_lib_t;
- ')
-
- files_search_var_lib($1)
- allow $1 apt_var_lib_t:dir list_dir_perms;
- read_files_pattern($1, apt_var_lib_t, apt_var_lib_t)
- read_lnk_files_pattern($1, apt_var_lib_t, apt_var_lib_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `apt_read_db'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## apt package database content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`apt_manage_db',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `apt_manage_db'($*)) dnl
-
- gen_require(`
- type apt_var_lib_t;
- ')
-
- files_search_var_lib($1)
- manage_files_pattern($1, apt_var_lib_t, apt_var_lib_t)
- manage_lnk_files_pattern($1, apt_var_lib_t, apt_var_lib_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `apt_manage_db'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to create,
-## read, write, and delete apt
-## package database content.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`apt_dontaudit_manage_db',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `apt_dontaudit_manage_db'($*)) dnl
-
- gen_require(`
- type apt_var_lib_t;
- ')
-
- dontaudit $1 apt_var_lib_t:dir rw_dir_perms;
- dontaudit $1 apt_var_lib_t:file manage_file_perms;
- dontaudit $1 apt_var_lib_t:lnk_file manage_lnk_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `apt_dontaudit_manage_db'($*)) dnl
- ')
-
-## Time zone updater.
-
-########################################
-##
-## Execute a domain transition to run tzdata.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`tzdata_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `tzdata_domtrans'($*)) dnl
-
- gen_require(`
- type tzdata_t, tzdata_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, tzdata_exec_t, tzdata_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `tzdata_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute tzdata in the tzdata domain,
-## and allow the specified role
-## the tzdata domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`tzdata_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `tzdata_run'($*)) dnl
-
- gen_require(`
- attribute_role tzdata_roles;
- ')
-
- tzdata_domtrans($1)
- roleattribute $2 tzdata_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `tzdata_run'($*)) dnl
- ')
-
-## Utilities for configuring the Linux ethernet bridge.
-
-########################################
-##
-## Execute a domain transition to run brctl.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`brctl_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `brctl_domtrans'($*)) dnl
-
- gen_require(`
- type brctl_t, brctl_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, brctl_exec_t, brctl_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `brctl_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute brctl in the brctl domain, and
-## allow the specified role the brctl domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`brctl_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `brctl_run'($*)) dnl
-
- gen_require(`
- attribute_role brctl_roles;
- ')
-
- brctl_domtrans($1)
- roleattribute $2 brctl_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `brctl_run'($*)) dnl
- ')
-
-## Kernel crash dumping mechanism.
-
-######################################
-##
-## Execute kdump in the kdump domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`kdump_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kdump_domtrans'($*)) dnl
-
- gen_require(`
- type kdump_t, kdump_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, kdump_exec_t, kdump_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kdump_domtrans'($*)) dnl
- ')
-
-
-#######################################
-##
-## Execute kdump init scripts in
-## the init script domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`kdump_initrc_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kdump_initrc_domtrans'($*)) dnl
-
- gen_require(`
- type kdump_initrc_exec_t;
- ')
-
- init_labeled_script_domtrans($1, kdump_initrc_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kdump_initrc_domtrans'($*)) dnl
- ')
-
-
-#####################################
-##
-## Read kdump configuration files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kdump_read_config',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kdump_read_config'($*)) dnl
-
- gen_require(`
- type kdump_etc_t;
- ')
-
- files_search_etc($1)
- allow $1 kdump_etc_t:file read_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kdump_read_config'($*)) dnl
- ')
-
-
-####################################
-##
-## Create, read, write, and delete
-## kdmup configuration files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kdump_manage_config',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kdump_manage_config'($*)) dnl
-
- gen_require(`
- type kdump_etc_t;
- ')
-
- files_search_etc($1)
- allow $1 kdump_etc_t:file manage_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kdump_manage_config'($*)) dnl
- ')
-
-
-######################################
-##
-## All of the rules required to
-## administrate an kdump environment.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`kdump_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kdump_admin'($*)) dnl
-
- gen_require(`
- type kdump_t, kdump_etc_t, kdumpctl_tmp_t;
- type kdump_initrc_exec_t, kdumpctl_t;
- ')
-
- allow $1 { kdump_t kdumpctl_t }:process { ptrace signal_perms };
- ps_process_pattern($1, { kdump_t kdumpctl_t })
-
- init_startstop_service($1, $2, kdump_t, kdump_initrc_exec_t)
-
- files_search_etc($1)
- admin_pattern($1, kdump_etc_t)
-
- files_search_tmp($1)
- admin_pattern($1, kdumpctl_tmp_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kdump_admin'($*)) dnl
- ')
-
-## The Fedora hardware profiler client.
-## sigrok signal analysis software suite.
-
-########################################
-##
-## Execute sigrok in its domain.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`sigrok_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `sigrok_run'($*)) dnl
-
- gen_require(`
- type sigrok_t, sigrok_exec_t;
- attribute_role sigrok_roles;
- ')
-
- roleattribute $1 sigrok_roles;
- domtrans_pattern($2, sigrok_exec_t, sigrok_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `sigrok_run'($*)) dnl
- ')
-
-## Policy for Mozilla and related web browsers.
-
-########################################
-##
-## Role access for mozilla.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`mozilla_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mozilla_role'($*)) dnl
-
- gen_require(`
- type mozilla_t, mozilla_exec_t, mozilla_home_t;
- type mozilla_tmp_t, mozilla_tmpfs_t, mozilla_plugin_tmp_t;
- type mozilla_plugin_tmpfs_t, mozilla_plugin_home_t;
- attribute_role mozilla_roles;
- ')
-
- ########################################
- #
- # Declarations
- #
-
- roleattribute $1 mozilla_roles;
-
- ########################################
- #
- # Policy
- #
-
- domtrans_pattern($2, mozilla_exec_t, mozilla_t)
-
- allow $2 mozilla_t:process { noatsecure siginh rlimitinh ptrace signal_perms };
- ps_process_pattern($2, mozilla_t)
-
- allow mozilla_t $2:process signull;
- allow mozilla_t $2:unix_stream_socket connectto;
-
- allow $2 mozilla_t:fd use;
- allow $2 mozilla_t:shm rw_shm_perms;
-
- stream_connect_pattern($2, mozilla_tmpfs_t, mozilla_tmpfs_t, mozilla_t)
-
- allow $2 { mozilla_home_t mozilla_plugin_home_t }:dir { manage_dir_perms relabel_dir_perms };
- allow $2 { mozilla_home_t mozilla_plugin_home_t }:file { manage_file_perms relabel_file_perms };
- allow $2 mozilla_home_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
- userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".galeon")
- userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".mozilla")
- userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".netscape")
- userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".phoenix")
-
- filetrans_pattern($2, mozilla_home_t, mozilla_plugin_home_t, dir, "plugins")
-
- allow $2 { mozilla_tmp_t mozilla_plugin_tmp_t }:dir { manage_dir_perms relabel_dir_perms };
- allow $2 { mozilla_tmp_t mozilla_plugin_tmp_t }:file { manage_file_perms relabel_file_perms };
- allow $2 mozilla_plugin_tmp_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
-
- allow $2 { mozilla_tmpfs_t mozilla_plugin_tmpfs_t }:dir { manage_dir_perms relabel_dir_perms };
- allow $2 { mozilla_tmpfs_t mozilla_plugin_tmpfs_t }:file { manage_file_perms relabel_file_perms };
- allow $2 { mozilla_tmpfs_t mozilla_plugin_tmpfs_t }:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
- allow $2 { mozilla_tmpfs_t mozilla_plugin_tmpfs_t }:sock_file { manage_sock_file_perms relabel_sock_file_perms };
-
- optional_policy(`
- mozilla_dbus_chat($2)
- ')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mozilla_role'($*)) dnl
- ')
-
-
-########################################
-##
-## Role access for mozilla plugin.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`mozilla_role_plugin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mozilla_role_plugin'($*)) dnl
-
- gen_require(`
- type mozilla_plugin_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t;
- type mozilla_plugin_rw_t, mozilla_plugin_config_t, mozilla_home_t;
- ')
-
- mozilla_run_plugin($2, $1)
- mozilla_run_plugin_config($2, $1)
-
- allow $2 { mozilla_plugin_t mozilla_plugin_config_t }:process { ptrace signal_perms };
- ps_process_pattern($2, { mozilla_plugin_t mozilla_plugin_config_t })
-
- allow $2 mozilla_plugin_t:unix_stream_socket rw_socket_perms;
- allow $2 mozilla_plugin_t:fd use;
-
- stream_connect_pattern($2, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t, mozilla_plugin_t)
-
- allow mozilla_plugin_t $2:process signull;
- allow mozilla_plugin_t $2:unix_stream_socket { connectto rw_socket_perms };
- allow mozilla_plugin_t $2:unix_dgram_socket { sendto rw_socket_perms };
- allow mozilla_plugin_t $2:shm { rw_shm_perms destroy };
- allow mozilla_plugin_t $2:sem create_sem_perms;
-
- allow $2 mozilla_home_t:dir { manage_dir_perms relabel_dir_perms };
- allow $2 mozilla_home_t:file { manage_file_perms relabel_file_perms };
- allow $2 mozilla_home_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
- userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".galeon")
- userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".mozilla")
- userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".netscape")
- userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".phoenix")
-
- allow $2 mozilla_plugin_tmp_t:dir { manage_dir_perms relabel_dir_perms };
- allow $2 mozilla_plugin_tmp_t:file { manage_file_perms relabel_file_perms };
- allow $2 mozilla_plugin_tmp_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
-
- allow $2 mozilla_plugin_tmpfs_t:dir { manage_dir_perms relabel_dir_perms };
- allow $2 mozilla_plugin_tmpfs_t:file { manage_file_perms relabel_file_perms };
- allow $2 mozilla_plugin_tmpfs_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
- allow $2 mozilla_plugin_tmpfs_t:sock_file { manage_sock_file_perms relabel_sock_file_perms };
-
- allow $2 mozilla_plugin_rw_t:dir list_dir_perms;
- allow $2 mozilla_plugin_rw_t:file read_file_perms;
- allow $2 mozilla_plugin_rw_t:lnk_file read_lnk_file_perms;
-
- can_exec($2, mozilla_plugin_rw_t)
-
- optional_policy(`
- mozilla_dbus_chat_plugin($2)
- ')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mozilla_role_plugin'($*)) dnl
- ')
-
-
-########################################
-##
-## Read mozilla home directory content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`mozilla_read_user_home',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mozilla_read_user_home'($*)) dnl
-
- gen_require(`
- type mozilla_home_t;
- ')
-
- list_dirs_pattern($1, mozilla_home_t, mozilla_home_t)
- read_files_pattern($1, mozilla_home_t, mozilla_home_t)
- userdom_search_user_home_dirs($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mozilla_read_user_home'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Read mozilla home directory files
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`mozilla_read_user_home_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mozilla_read_user_home_files'($*)) dnl
-
- gen_require(`
- type mozilla_home_t;
- ')
-
- userdom_search_user_home_dirs($1)
- allow $1 mozilla_home_t:dir list_dir_perms;
- allow $1 mozilla_home_t:file read_file_perms;
- allow $1 mozilla_home_t:lnk_file read_lnk_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mozilla_read_user_home_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Write mozilla home directory files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`mozilla_write_user_home_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mozilla_write_user_home_files'($*)) dnl
-
- gen_require(`
- type mozilla_home_t;
- ')
-
- userdom_search_user_home_dirs($1)
- write_files_pattern($1, mozilla_home_t, mozilla_home_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mozilla_write_user_home_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to read and
-## write mozilla home directory files.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`mozilla_dontaudit_rw_user_home_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mozilla_dontaudit_rw_user_home_files'($*)) dnl
-
- gen_require(`
- type mozilla_home_t;
- ')
-
- dontaudit $1 mozilla_home_t:file rw_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mozilla_dontaudit_rw_user_home_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempt to Create,
-## read, write, and delete mozilla
-## home directory content.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`mozilla_dontaudit_manage_user_home_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mozilla_dontaudit_manage_user_home_files'($*)) dnl
-
- gen_require(`
- type mozilla_home_t;
- ')
-
- dontaudit $1 mozilla_home_t:dir manage_dir_perms;
- dontaudit $1 mozilla_home_t:file manage_file_perms;
- dontaudit $1 mozilla_home_t:lnk_file manage_lnk_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mozilla_dontaudit_manage_user_home_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute mozilla plugin home directory files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`mozilla_exec_user_plugin_home_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mozilla_exec_user_plugin_home_files'($*)) dnl
-
- gen_require(`
- type mozilla_home_t, mozilla_plugin_home_t;
- ')
-
- userdom_search_user_home_dirs($1)
- exec_files_pattern($1, { mozilla_home_t mozilla_plugin_home_t }, mozilla_plugin_home_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mozilla_exec_user_plugin_home_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Mozilla plugin home directory file
-## text relocation.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`mozilla_execmod_user_plugin_home_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mozilla_execmod_user_plugin_home_files'($*)) dnl
-
- gen_require(`
- type mozilla_plugin_home_t;
- ')
-
- allow $1 mozilla_plugin_home_t:file execmod;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mozilla_execmod_user_plugin_home_files'($*)) dnl
- ')
-
-
-#######################################
-##
-## Read temporary mozilla files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`mozilla_read_tmp_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mozilla_read_tmp_files'($*)) dnl
-
- gen_require(`
- type mozilla_tmp_t;
- ')
-
- read_files_pattern($1, mozilla_tmp_t, mozilla_tmp_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mozilla_read_tmp_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Run mozilla in the mozilla domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`mozilla_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mozilla_domtrans'($*)) dnl
-
- gen_require(`
- type mozilla_t, mozilla_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, mozilla_exec_t, mozilla_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mozilla_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute a domain transition to
-## run mozilla plugin.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`mozilla_domtrans_plugin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mozilla_domtrans_plugin'($*)) dnl
-
- gen_require(`
- type mozilla_plugin_t, mozilla_plugin_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, mozilla_plugin_exec_t, mozilla_plugin_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mozilla_domtrans_plugin'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute mozilla plugin in the
-## mozilla plugin domain, and allow
-## the specified role the mozilla
-## plugin domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`mozilla_run_plugin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mozilla_run_plugin'($*)) dnl
-
- gen_require(`
- attribute_role mozilla_plugin_roles;
- ')
-
- mozilla_domtrans_plugin($1)
- roleattribute $2 mozilla_plugin_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mozilla_run_plugin'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute a domain transition to
-## run mozilla plugin config.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`mozilla_domtrans_plugin_config',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mozilla_domtrans_plugin_config'($*)) dnl
-
- gen_require(`
- type mozilla_plugin_config_t, mozilla_plugin_config_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, mozilla_plugin_config_exec_t, mozilla_plugin_config_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mozilla_domtrans_plugin_config'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute mozilla plugin config in
-## the mozilla plugin config domain,
-## and allow the specified role the
-## mozilla plugin config domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`mozilla_run_plugin_config',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mozilla_run_plugin_config'($*)) dnl
-
- gen_require(`
- attribute_role mozilla_plugin_config_roles;
- ')
-
- mozilla_domtrans_plugin_config($1)
- roleattribute $2 mozilla_plugin_config_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mozilla_run_plugin_config'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive messages from
-## mozilla over dbus.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`mozilla_dbus_chat',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mozilla_dbus_chat'($*)) dnl
-
- gen_require(`
- type mozilla_t;
- class dbus send_msg;
- ')
-
- allow $1 mozilla_t:dbus send_msg;
- allow mozilla_t $1:dbus send_msg;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mozilla_dbus_chat'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive messages from
-## mozilla plugin over dbus.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`mozilla_dbus_chat_plugin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mozilla_dbus_chat_plugin'($*)) dnl
-
- gen_require(`
- type mozilla_plugin_t;
- class dbus send_msg;
- ')
-
- allow $1 mozilla_plugin_t:dbus send_msg;
- allow mozilla_plugin_t $1:dbus send_msg;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mozilla_dbus_chat_plugin'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write mozilla TCP sockets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`mozilla_rw_tcp_sockets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mozilla_rw_tcp_sockets'($*)) dnl
-
- gen_require(`
- type mozilla_t;
- ')
-
- allow $1 mozilla_t:tcp_socket rw_socket_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mozilla_rw_tcp_sockets'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## mozilla plugin rw files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`mozilla_manage_plugin_rw_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mozilla_manage_plugin_rw_files'($*)) dnl
-
- gen_require(`
- type mozilla_plugin_rw_t;
- ')
-
- libs_search_lib($1)
- manage_files_pattern($1, mozilla_plugin_rw_t, mozilla_plugin_rw_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mozilla_manage_plugin_rw_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Read mozilla_plugin tmpfs files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`mozilla_plugin_read_tmpfs_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mozilla_plugin_read_tmpfs_files'($*)) dnl
-
- gen_require(`
- type mozilla_plugin_tmpfs_t;
- ')
-
- fs_search_tmpfs($1)
- allow $1 mozilla_plugin_tmpfs_t:file read_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mozilla_plugin_read_tmpfs_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Delete mozilla_plugin tmpfs files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`mozilla_plugin_delete_tmpfs_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mozilla_plugin_delete_tmpfs_files'($*)) dnl
-
- gen_require(`
- type mozilla_plugin_tmpfs_t;
- ')
-
- fs_search_tmpfs($1)
- allow $1 mozilla_plugin_tmpfs_t:file delete_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mozilla_plugin_delete_tmpfs_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Read/write to mozilla's tmp fifo files
-##
-##
-##
-## Domain allowed access
-##
-##
-#
- define(`mozilla_rw_tmp_pipes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mozilla_rw_tmp_pipes'($*)) dnl
-
- gen_require(`
- type mozilla_tmp_t;
- ')
-
- rw_fifo_files_pattern($1, mozilla_tmp_t, mozilla_tmp_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mozilla_rw_tmp_pipes'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## generic mozilla plugin home content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`mozilla_manage_generic_plugin_home_content',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mozilla_manage_generic_plugin_home_content'($*)) dnl
-
- gen_require(`
- type mozilla_plugin_home_t;
- ')
-
- userdom_search_user_home_dirs($1)
- allow $1 mozilla_plugin_home_t:dir manage_dir_perms;
- allow $1 mozilla_plugin_home_t:file manage_file_perms;
- allow $1 mozilla_plugin_home_t:fifo_file manage_fifo_file_perms;
- allow $1 mozilla_plugin_home_t:lnk_file manage_lnk_file_perms;
- allow $1 mozilla_plugin_home_t:sock_file manage_sock_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mozilla_manage_generic_plugin_home_content'($*)) dnl
- ')
-
-
-########################################
-##
-## Create objects in user home
-## directories with the generic mozilla
-## plugin home type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Class of the object being created.
-##
-##
-##
-##
-## The name of the object being created.
-##
-##
-#
- define(`mozilla_home_filetrans_plugin_home',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mozilla_home_filetrans_plugin_home'($*)) dnl
-
- gen_require(`
- type mozilla_plugin_home_t;
- ')
-
- userdom_user_home_dir_filetrans($1, mozilla_plugin_home_t, $2, $3)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mozilla_home_filetrans_plugin_home'($*)) dnl
- ')
-
-
-# This is gentoo specific but cannot use ifdef distro_gentoo
-
-########################################
-##
-## Do not audit use of mozilla file descriptors
-##
-##
-##
-## Domain to dont audit access from
-##
-##
-#
- define(`mozilla_dontaudit_use_fds',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mozilla_dontaudit_use_fds'($*)) dnl
-
- gen_require(`
- type mozilla_t;
- ')
-
- dontaudit $1 mozilla_t:fd use;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mozilla_dontaudit_use_fds'($*)) dnl
- ')
-
-
-########################################
-##
-## Send messages to mozilla plugin unix datagram sockets
-##
-##
-##
-## Domain allowed access
-##
-##
-#
- define(`mozilla_send_dgram_plugin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mozilla_send_dgram_plugin'($*)) dnl
-
- gen_require(`
- type mozilla_plugin_t;
- ')
-
- allow $1 mozilla_plugin_t:unix_dgram_socket sendto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mozilla_send_dgram_plugin'($*)) dnl
- ')
-
-## Openoffice suite.
-
-############################################################
-##
-## Role access for openoffice.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`ooffice_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `ooffice_role'($*)) dnl
-
- gen_require(`
- attribute_role ooffice_roles;
- type ooffice_t, ooffice_exec_t;
- ')
-
- roleattribute $1 ooffice_roles;
-
- allow ooffice_t $2:unix_stream_socket connectto;
-
- domtrans_pattern($2, ooffice_exec_t, ooffice_t)
-
- allow $2 ooffice_t:process { ptrace signal_perms };
- ps_process_pattern($2, ooffice_t)
-
- optional_policy(`
- ooffice_dbus_chat($2)
- ')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `ooffice_role'($*)) dnl
- ')
-
-
-########################################
-##
-## Run openoffice in its own domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`ooffice_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `ooffice_domtrans'($*)) dnl
-
- gen_require(`
- type ooffice_t, ooffice_exec_t;
- ')
-
- domtrans_pattern($1, ooffice_exec_t, ooffice_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `ooffice_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to execute
-## files in temporary directories.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`ooffice_dontaudit_exec_tmp_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `ooffice_dontaudit_exec_tmp_files'($*)) dnl
-
- gen_require(`
- type ooffice_tmp_t;
- ')
-
- dontaudit $1 ooffice_tmp_t:file exec_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `ooffice_dontaudit_exec_tmp_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write temporary
-## openoffice files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`ooffice_rw_tmp_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `ooffice_rw_tmp_files'($*)) dnl
-
- gen_require(`
- type ooffice_tmp_t;
- ')
-
- rw_files_pattern($1, ooffice_tmp_t, ooffice_tmp_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `ooffice_rw_tmp_files'($*)) dnl
- ')
-
-
-#######################################
-##
-## Send and receive dbus messages
-## from and to the openoffice
-## domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`ooffice_dbus_chat',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `ooffice_dbus_chat'($*)) dnl
-
- gen_require(`
- type ooffice_t;
- class dbus send_msg;
- ')
-
- allow $1 ooffice_t:dbus send_msg;
- allow ooffice_t $1:dbus send_msg;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `ooffice_dbus_chat'($*)) dnl
- ')
-
-
-########################################
-##
-## Connect to openoffice using a
-## unix domain stream socket.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`ooffice_stream_connect',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `ooffice_stream_connect'($*)) dnl
-
- gen_require(`
- type ooffice_t, ooffice_tmp_t;
- ')
-
- files_search_tmp($1)
- stream_connect_pattern($1, ooffice_tmp_t, ooffice_tmp_t, ooffice_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `ooffice_stream_connect'($*)) dnl
- ')
-
-## Telepathy communications framework.
-
-#######################################
-##
-## The template to define a telepathy domain.
-##
-##
-##
-## Domain prefix to be used.
-##
-##
-#
- define(`telepathy_domain_template',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `telepathy_domain_template'($*)) dnl
-
- gen_require(`
- attribute telepathy_domain, telepathy_executable, telepathy_tmp_content;
- ')
-
- type telepathy_$1_t, telepathy_domain;
- type telepathy_$1_exec_t, telepathy_executable;
- userdom_user_application_domain(telepathy_$1_t, telepathy_$1_exec_t)
-
- type telepathy_$1_tmp_t, telepathy_tmp_content;
- userdom_user_tmp_file(telepathy_$1_tmp_t)
-
- optional_policy(`
- wm_application_domain(telepathy_$1_t, telepathy_$1_exec_t)
- ')
-
- auth_use_nsswitch(telepathy_$1_t)
- dnl
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `telepathy_domain_template'($*)) dnl
- ')
-
-
-#######################################
-##
-## The role template for the telepathy module.
-##
-##
-##
-## This template creates a derived domains which are used
-## for window manager applications.
-##
-##
-##
-##
-## The prefix of the user domain (e.g., user
-## is the prefix for user_t).
-##
-##
-##
-##
-## The role associated with the user domain.
-##
-##
-##
-##
-## The type of the user domain.
-##
-##
-#
- define(`telepathy_role_template',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `telepathy_role_template'($*)) dnl
-
- gen_require(`
- attribute telepathy_domain, telepathy_tmp_content;
- type telepathy_gabble_t, telepathy_sofiasip_t, telepathy_idle_t;
- type telepathy_mission_control_t, telepathy_salut_t, telepathy_sunshine_t;
- type telepathy_stream_engine_t, telepathy_msn_t, telepathy_gabble_exec_t;
- type telepathy_sofiasip_exec_t, telepathy_idle_exec_t;
- type telepathy_logger_t, telepathy_logger_exec_t;
- type telepathy_mission_control_exec_t, telepathy_salut_exec_t;
- type telepathy_sunshine_exec_t, telepathy_stream_engine_exec_t;
- type telepathy_msn_exec_t;
-
- type telepathy_mission_control_xdg_cache_t, telepathy_xdg_cache_t, telepathy_logger_xdg_cache_t;
- type telepathy_gabble_xdg_cache_t, telepathy_mission_control_t, telepathy_xdg_data_t;
- type telepathy_mission_control_xdg_data_t, telepathy_sunshine_home_t, telepathy_logger_xdg_data_t;
- type telepathy_mission_control_home_t;
- ')
-
- role $2 types telepathy_domain;
-
- allow $3 telepathy_domain:process { ptrace signal_perms };
- ps_process_pattern($3, telepathy_domain)
-
- telepathy_gabble_stream_connect($3)
- telepathy_msn_stream_connect($3)
- telepathy_salut_stream_connect($3)
-
- dbus_spec_session_domain($1, telepathy_gabble_t, telepathy_gabble_exec_t)
- dbus_spec_session_domain($1, telepathy_sofiasip_t, telepathy_sofiasip_exec_t)
- dbus_spec_session_domain($1, telepathy_idle_t, telepathy_idle_exec_t)
- dbus_spec_session_domain($1, telepathy_logger_t, telepathy_logger_exec_t)
- dbus_spec_session_domain($1, telepathy_mission_control_t, telepathy_mission_control_exec_t)
- dbus_spec_session_domain($1, telepathy_salut_t, telepathy_salut_exec_t)
- dbus_spec_session_domain($1, telepathy_sunshine_t, telepathy_sunshine_exec_t)
- dbus_spec_session_domain($1, telepathy_stream_engine_t, telepathy_stream_engine_exec_t)
- dbus_spec_session_domain($1, telepathy_msn_t, telepathy_msn_exec_t)
-
- allow $3 { telepathy_mission_control_xdg_cache_t telepathy_xdg_cache_t telepathy_logger_xdg_cache_t }:dir { manage_dir_perms relabel_dir_perms };
- allow $3 { telepathy_gabble_xdg_cache_t telepathy_mission_control_home_t telepathy_xdg_data_t }:dir { manage_dir_perms relabel_dir_perms };
- allow $3 { telepathy_mission_control_xdg_data_t telepathy_sunshine_home_t telepathy_logger_xdg_data_t }:dir { manage_dir_perms relabel_dir_perms };
-
- allow $3 { telepathy_mission_control_xdg_cache_t telepathy_xdg_cache_t telepathy_logger_xdg_cache_t }:file { manage_file_perms relabel_file_perms };
- allow $3 { telepathy_gabble_xdg_cache_t telepathy_mission_control_home_t telepathy_xdg_data_t }:file { manage_file_perms relabel_file_perms };
- allow $3 { telepathy_mission_control_xdg_data_t telepathy_sunshine_home_t telepathy_logger_xdg_data_t }:file { manage_file_perms relabel_file_perms };
-
- filetrans_pattern($3, telepathy_xdg_cache_t, telepathy_gabble_xdg_cache_t, dir, "gabble")
- # gnome_cache_filetrans($3, telepathy_gabble_cache_home_t, dir, "wocky")
-
- filetrans_pattern($3, telepathy_xdg_cache_t, telepathy_logger_xdg_cache_t, dir, "logger")
- # gnome_data_filetrans($3, telepathy_logger_data_home_t, dir, "TpLogger")
-
- userdom_user_home_dir_filetrans($3, telepathy_mission_control_home_t, dir, ".mission-control")
- filetrans_pattern($3, telepathy_xdg_data_t, telepathy_mission_control_xdg_data_t, dir, "mission-control")
- # gnome_cache_filetrans($3, telepathy_mission_control_cache_home_t, file, ".mc_connections")
-
- userdom_user_home_dir_filetrans($3, telepathy_sunshine_home_t, dir, ".telepathy-sunshine")
-
- # gnome_cache_filetrans($3, telepathy_cache_home_t, dir, "telepathy")
- # gnome_data_filetrans($3, telepathy_data_home_t, dir, "telepathy")
-
- allow $3 telepathy_tmp_content:dir { manage_dir_perms relabel_dir_perms };
- allow $3 telepathy_tmp_content:file { manage_file_perms relabel_file_perms };
- allow $3 telepathy_tmp_content:sock_file { manage_sock_file_perms relabel_sock_file_perms };
-
- telepathy_mission_control_dbus_chat($3)
- dnl
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `telepathy_role_template'($*)) dnl
- ')
-
-
-########################################
-##
-## Connect to gabble with a unix
-## domain stream socket.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`telepathy_gabble_stream_connect',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `telepathy_gabble_stream_connect'($*)) dnl
-
- gen_require(`
- type telepathy_gabble_t, telepathy_gabble_tmp_t;
- ')
-
- files_search_tmp($1)
- stream_connect_pattern($1, telepathy_gabble_tmp_t, telepathy_gabble_tmp_t, telepathy_gabble_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `telepathy_gabble_stream_connect'($*)) dnl
- ')
-
-
-########################################
-##
-## Send dbus messages to and from
-## gabble.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`telepathy_gabble_dbus_chat',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `telepathy_gabble_dbus_chat'($*)) dnl
-
- gen_require(`
- type telepathy_gabble_t;
- class dbus send_msg;
- ')
-
- allow $1 telepathy_gabble_t:dbus send_msg;
- allow telepathy_gabble_t $1:dbus send_msg;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `telepathy_gabble_dbus_chat'($*)) dnl
- ')
-
-
-########################################
-##
-## Send dbus messages to and from
-## mission control.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`telepathy_mission_control_dbus_chat',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `telepathy_mission_control_dbus_chat'($*)) dnl
-
- gen_require(`
- type telepathy_mission_control_t;
- class dbus send_msg;
- ')
-
- allow $1 telepathy_mission_control_t:dbus send_msg;
- allow telepathy_mission_control_t $1:dbus send_msg;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `telepathy_mission_control_dbus_chat'($*)) dnl
- ')
-
-
-########################################
-##
-## Read mission control process state files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`telepathy_mission_control_read_state',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `telepathy_mission_control_read_state'($*)) dnl
-
- gen_require(`
- type telepathy_mission_control_t;
- ')
-
- kernel_search_proc($1)
- allow $1 telepathy_mission_control_t:dir list_dir_perms;
- allow $1 telepathy_mission_control_t:file read_file_perms;
- allow $1 telepathy_mission_control_t:lnk_file read_lnk_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `telepathy_mission_control_read_state'($*)) dnl
- ')
-
-
-#######################################
-##
-## Connect to msn with a unix
-## domain stream socket.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`telepathy_msn_stream_connect',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `telepathy_msn_stream_connect'($*)) dnl
-
- gen_require(`
- type telepathy_msn_t, telepathy_msn_tmp_t;
- ')
-
- files_search_tmp($1)
- stream_connect_pattern($1, telepathy_msn_tmp_t, telepathy_msn_tmp_t, telepathy_msn_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `telepathy_msn_stream_connect'($*)) dnl
- ')
-
-
-########################################
-##
-## Connect to salut with a unix
-## domain stream socket.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`telepathy_salut_stream_connect',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `telepathy_salut_stream_connect'($*)) dnl
-
- gen_require(`
- type telepathy_salut_t, telepathy_salut_tmp_t;
- ')
-
- files_search_tmp($1)
- stream_connect_pattern($1, telepathy_salut_tmp_t, telepathy_salut_tmp_t, telepathy_salut_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `telepathy_salut_stream_connect'($*)) dnl
- ')
-
-## Tools for managing and hosting git repositories.
-
-#######################################
-##
-## Execute a domain transition to run gitosis.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`gitosis_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gitosis_domtrans'($*)) dnl
-
- gen_require(`
- type gitosis_t, gitosis_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, gitosis_exec_t, gitosis_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gitosis_domtrans'($*)) dnl
- ')
-
-
-#######################################
-##
-## Execute gitosis-serve in the
-## gitosis domain, and allow the
-## specified role the gitosis domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`gitosis_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gitosis_run'($*)) dnl
-
- gen_require(`
- attribute_role gitosis_roles;
- ')
-
- gitosis_domtrans($1)
- roleattribute $2 gitosis_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gitosis_run'($*)) dnl
- ')
-
-
-#######################################
-##
-## Read gitosis lib files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gitosis_read_lib_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gitosis_read_lib_files'($*)) dnl
-
- gen_require(`
- type gitosis_var_lib_t;
- ')
-
- files_search_var_lib($1)
- read_files_pattern($1, gitosis_var_lib_t, gitosis_var_lib_t)
- read_lnk_files_pattern($1, gitosis_var_lib_t, gitosis_var_lib_t)
- list_dirs_pattern($1, gitosis_var_lib_t, gitosis_var_lib_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gitosis_read_lib_files'($*)) dnl
- ')
-
-
-######################################
-##
-## Create, read, write, and delete
-## gitosis lib files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gitosis_manage_lib_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gitosis_manage_lib_files'($*)) dnl
-
- gen_require(`
- type gitosis_var_lib_t;
- ')
-
- files_search_var_lib($1)
- manage_files_pattern($1, gitosis_var_lib_t, gitosis_var_lib_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gitosis_manage_lib_files'($*)) dnl
- ')
-
-## Update database for mlocate.
-
-########################################
-##
-## Read locate lib files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`locate_read_lib_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `locate_read_lib_files'($*)) dnl
-
- gen_require(`
- type locate_var_lib_t;
- ')
-
- files_search_var_lib($1)
- read_files_pattern($1, locate_var_lib_t, locate_var_lib_t)
- allow $1 locate_var_lib_t:dir list_dir_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `locate_read_lib_files'($*)) dnl
- ')
-
-## High quality television application.
-
-########################################
-##
-## Role access for tvtime
-##
-##
-##
-## Role allowed access
-##
-##
-##
-##
-## User domain for the role
-##
-##
-#
- define(`tvtime_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `tvtime_role'($*)) dnl
-
- gen_require(`
- attribute_role tvtime_roles;
- type tvtime_t, tvtime_exec_t, tvtime_tmp_t;
- type tvtime_home_t, tvtime_tmpfs_t;
- ')
-
- roleattribute $1 tvtime_roles;
-
- domtrans_pattern($2, tvtime_exec_t, tvtime_t)
-
- ps_process_pattern($2, tvtime_t)
- allow $2 tvtime_t:process { ptrace signal_perms };
-
- allow $2 { tvtime_home_t tvtime_tmp_t }:dir { manage_dir_perms relabel_dir_perms };
- allow $2 { tvtime_home_t tvtime_tmpfs_t tvtime_tmp_t }:file { manage_file_perms relabel_file_perms };
- allow $2 { tvtime_home_t tvtime_tmpfs_t }:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
- allow $2 tvtime_tmpfs_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
- allow $2 tvtime_tmpfs_t:sock_file { manage_sock_file_perms relabel_sock_file_perms };
- userdom_user_home_dir_filetrans($2, tvtime_home_t, dir, ".tvtime")
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `tvtime_role'($*)) dnl
- ')
-
-## On-line manual database.
-
-########################################
-##
-## Execute the mandb program in
-## the mandb domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`mandb_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mandb_domtrans'($*)) dnl
-
- gen_require(`
- type mandb_t, mandb_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, mandb_exec_t, mandb_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mandb_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute mandb in the mandb
-## domain, and allow the specified
-## role the mandb domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`mandb_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mandb_run'($*)) dnl
-
- gen_require(`
- attribute_role mandb_roles;
- ')
-
- mandb_domtrans($1)
- roleattribute $2 mandb_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mandb_run'($*)) dnl
- ')
-
-
-########################################
-##
-## All of the rules required to
-## administrate an mandb environment.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`mandb_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mandb_admin'($*)) dnl
-
- gen_require(`
- type mandb_t;
- ')
-
- admin_process_pattern($1, mandb_t)
-
- mandb_run($1, $2)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mandb_admin'($*)) dnl
- ')
-
-## Squid log analysis.
-
-########################################
-##
-## Execute the calamaris in
-## the calamaris domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`calamaris_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `calamaris_domtrans'($*)) dnl
-
- gen_require(`
- type calamaris_t, calamaris_exec_t;
- ')
-
- files_search_etc($1)
- domtrans_pattern($1, calamaris_exec_t, calamaris_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `calamaris_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute calamaris in the
-## calamaris domain, and allow the
-## specified role the calamaris domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`calamaris_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `calamaris_run'($*)) dnl
-
- gen_require(`
- attribute_role calamaris_roles;
- ')
-
- lightsquid_domtrans($1)
- roleattribute $2 calamaris_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `calamaris_run'($*)) dnl
- ')
-
-
-#######################################
-##
-## Read calamaris www files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`calamaris_read_www_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `calamaris_read_www_files'($*)) dnl
-
- gen_require(`
- type calamaris_www_t;
- ')
-
- allow $1 calamaris_www_t:dir list_dir_perms;
- read_files_pattern($1, calamaris_www_t, calamaris_www_t)
- read_lnk_files_pattern($1, calamaris_www_t, calamaris_www_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `calamaris_read_www_files'($*)) dnl
- ')
-
-
-########################################
-##
-## All of the rules required to
-## administrate an calamaris environment.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`calamaris_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `calamaris_admin'($*)) dnl
-
- gen_require(`
- type calamaris_t, calamaris_log_t, calamaris_www_t;
- ')
-
- allow $1 calamaris_t:process { ptrace signal_perms };
- ps_process_pattern($1, calamaris_t)
-
- calamaris_run($1, $2)
-
- logging_list_logs($1)
- admin_pattern($1, calamaris_log_t)
-
- apache_list_sys_content($1)
- admin_pattern($1, calamaris_www_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `calamaris_admin'($*)) dnl
- ')
-
-## Java virtual machine
-
-########################################
-##
-## Role access for java.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`java_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `java_role'($*)) dnl
-
- gen_require(`
- attribute_role java_roles;
- type java_t, java_exec_t, java_tmp_t;
- type java_tmpfs_t;
- ')
-
- ########################################
- #
- # Declarations
- #
-
- roleattribute $1 java_roles;
-
- ########################################
- #
- # Policy
- #
-
- domtrans_pattern($2, java_exec_t, java_t)
-
- allow $2 java_t:process { noatsecure siginh rlimitinh ptrace signal_perms };
- ps_process_pattern($2, java_t)
-
- allow $2 java_tmp_t:dir { manage_dir_perms relabel_dir_perms };
- allow $2 { java_tmp_t java_tmpfs_t }:file { manage_file_perms relabel_file_perms };
- allow $2 java_tmpfs_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
- allow $2 java_tmpfs_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
- allow $2 java_tmpfs_t:sock_file { manage_sock_file_perms relabel_sock_file_perms };
-
- allow java_t $2:process signull;
- allow java_t $2:unix_stream_socket connectto;
- allow java_t $2:unix_stream_socket { read write };
- allow java_t $2:tcp_socket { read write };
-
- ifdef(`distro_gentoo',`
- gen_require(`
- type java_home_t;
- ')
-
- manage_files_pattern($2, java_home_t, java_home_t)
- manage_dirs_pattern($2, java_home_t, java_home_t)
- ')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `java_role'($*)) dnl
- ')
-
-
-#######################################
-##
-## The role template for the java module.
-##
-##
-##
-## This template creates a derived domains which are used
-## for java applications.
-##
-##
-##
-##
-## The prefix of the user domain (e.g., user
-## is the prefix for user_t).
-##
-##
-##
-##
-## The role associated with the user domain.
-##
-##
-##
-##
-## The type of the user domain.
-##
-##
-#
- define(`java_role_template',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `java_role_template'($*)) dnl
-
- gen_require(`
- attribute java_domain;
- type java_exec_t, java_tmp_t, java_tmpfs_t;
- type java_home_t;
- ')
-
- ########################################
- #
- # Declarations
- #
-
- type $1_java_t, java_domain;
- userdom_user_application_domain($1_java_t, java_exec_t)
-
- role $2 types $1_java_t;
-
- ########################################
- #
- # Policy
- #
-
- domtrans_pattern($3, java_exec_t, $1_java_t)
-
- allow $3 $1_java_t:process { ptrace noatsecure siginh rlimitinh signal_perms };
- ps_process_pattern($3, $1_java_t)
-
- allow $3 { java_home_t java_tmp_t }:dir { manage_dir_perms relabel_dir_perms };
- allow $3 { java_tmp_t java_tmpfs_t java_home_t }:file { manage_file_perms relabel_file_perms };
- allow $3 java_tmpfs_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
- allow $3 java_tmpfs_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
- allow $3 java_tmpfs_t:sock_file { manage_sock_file_perms relabel_sock_file_perms };
- userdom_user_home_dir_filetrans($3, java_home_t, dir, ".java")
-
- allow $1_java_t $3:process signull;
- allow $1_java_t $3:unix_stream_socket connectto;
- allow $1_java_t $3:unix_stream_socket { read write };
- allow $1_java_t $3:tcp_socket { read write };
-
- corecmd_bin_domtrans($1_java_t, $3)
-
- auth_use_nsswitch($1_java_t)
-
- optional_policy(`
- xserver_role($2, $1_java_t)
- ')
- dnl
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `java_role_template'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute the java program in the java domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`java_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `java_domtrans'($*)) dnl
-
- gen_require(`
- type java_t, java_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, java_exec_t, java_t)
-
- ifdef(`distro_gentoo',`
- # /usr/bin/java is a symlink
- files_read_usr_symlinks($1)
- ')
- dnl
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `java_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute java in the java domain, and
-## allow the specified role the java domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`java_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `java_run'($*)) dnl
-
- gen_require(`
- attribute_role java_roles;
- ')
-
- java_domtrans($1)
- roleattribute $2 java_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `java_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute the java program in the
-## unconfined java domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`java_domtrans_unconfined',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `java_domtrans_unconfined'($*)) dnl
-
- gen_require(`
- type unconfined_java_t, java_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, java_exec_t, unconfined_java_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `java_domtrans_unconfined'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute the java program in the
-## unconfined java domain and allow the
-## specified role the java domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`java_run_unconfined',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `java_run_unconfined'($*)) dnl
-
- gen_require(`
- attribute_role unconfined_java_roles;
- ')
-
- java_domtrans_unconfined($1)
- roleattribute $2 unconfined_java_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `java_run_unconfined'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute the java program in
-## the callers domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`java_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `java_exec'($*)) dnl
-
- gen_require(`
- type java_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, java_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `java_exec'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## generic java home content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`java_manage_generic_home_content',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `java_manage_generic_home_content'($*)) dnl
-
- gen_require(`
- type java_home_t;
- ')
-
- userdom_search_user_home_dirs($1)
- allow $1 java_home_t:dir manage_dir_perms;
- allow $1 java_home_t:file manage_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `java_manage_generic_home_content'($*)) dnl
- ')
-
-
-######################################
-##
-## Create, read, write, and delete
-## temporary java content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`java_manage_java_tmp',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `java_manage_java_tmp'($*)) dnl
-
- gen_require(`
- type java_tmp_t;
- ')
-
- allow $1 java_tmp_t:dir manage_dir_perms;
- allow $1 java_tmp_t:file manage_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `java_manage_java_tmp'($*)) dnl
- ')
-
-
-########################################
-##
-## Create specified objects in user home
-## directories with the generic java
-## home type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Class of the object being created.
-##
-##
-##
-##
-## The name of the object being created.
-##
-##
-#
- define(`java_home_filetrans_java_home',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `java_home_filetrans_java_home'($*)) dnl
-
- gen_require(`
- type java_home_t;
- ')
-
- userdom_user_home_dir_filetrans($1, java_home_t, $2, $3)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `java_home_filetrans_java_home'($*)) dnl
- ')
-
-
-########################################
-##
-## Run java in javaplugin domain and
-## do not clean the environment (atsecure)
-##
-##
-##
-## This is needed when java is called by an application with library
-## settings (such as is the case when invoked as a browser plugin)
-##
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`java_noatsecure_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `java_noatsecure_domtrans'($*)) dnl
-
- gen_require(`
- type java_t;
- ')
-
- allow $1 java_t:process noatsecure;
-
- java_domtrans($1)
- dnl
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `java_noatsecure_domtrans'($*)) dnl
- ')
-
-
-# everything after here is gentoo-specific. ifdef's are not allowed for this unfortunately
-
-#######################################
-##
-## The template for using java in a domain.
-##
-##
-##
-## This template creates a derived domains which are used
-## for java applications.
-##
-##
-##
-##
-## The type of the domain to be given java privs.
-##
-##
-#
- define(`java_domain_type',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `java_domain_type'($*)) dnl
-
- gen_require(`
- attribute java_domain;
- ')
-
- ########################################
- #
- # Policy
- #
-
- typeattribute $1 java_domain;
-
- # cannot be called on the attribute, so do it now
- auth_use_nsswitch($1)
- dnl
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `java_domain_type'($*)) dnl
- ')
-
-## Command-line CPU frequency settings.
-
-########################################
-##
-## Send and receive messages from
-## cpufreq-selector over dbus.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`cpufreqselector_dbus_chat',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `cpufreqselector_dbus_chat'($*)) dnl
-
- gen_require(`
- type cpufreqselector_t;
- class dbus send_msg;
- ')
-
- allow $1 cpufreqselector_t:dbus send_msg;
- allow cpufreqselector_t $1:dbus send_msg;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `cpufreqselector_dbus_chat'($*)) dnl
- ')
-
-## Run Windows programs in Linux.
-
-########################################
-##
-## Role access for wine.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`wine_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `wine_role'($*)) dnl
-
- gen_require(`
- attribute_role wine_roles;
- type wine_exec_t, wine_t, wine_tmp_t;
- type wine_home_t;
- ')
-
- roleattribute $1 wine_roles;
-
- domtrans_pattern($2, wine_exec_t, wine_t)
-
- allow wine_t $2:unix_stream_socket connectto;
- allow wine_t $2:process signull;
-
- ps_process_pattern($2, wine_t)
- allow $2 wine_t:process { ptrace signal_perms };
-
- allow $2 wine_t:fd use;
- allow $2 wine_t:shm { associate getattr };
- allow $2 wine_t:shm rw_shm_perms;
- allow $2 wine_t:unix_stream_socket connectto;
-
- allow $2 { wine_tmp_t wine_home_t }:dir { manage_dir_perms relabel_dir_perms };
- allow $2 { wine_tmp_t wine_home_t }:file { manage_file_perms relabel_file_perms };
- allow $2 wine_home_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
- userdom_user_home_dir_filetrans($2, wine_home_t, dir, ".wine")
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `wine_role'($*)) dnl
- ')
-
-
-#######################################
-##
-## The role template for the wine module.
-##
-##
-##
-## This template creates a derived domains which are used
-## for wine applications.
-##
-##
-##
-##
-## The prefix of the user domain (e.g., user
-## is the prefix for user_t).
-##
-##
-##
-##
-## The role associated with the user domain.
-##
-##
-##
-##
-## The type of the user domain.
-##
-##
-#
- define(`wine_role_template',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `wine_role_template'($*)) dnl
-
- gen_require(`
- type wine_exec_t;
- ')
-
- type $1_wine_t;
- userdom_user_application_domain($1_wine_t, wine_exec_t)
- role $2 types $1_wine_t;
-
- allow $1_wine_t self:process { execmem execstack };
-
- allow $3 $1_wine_t:process { ptrace noatsecure signal_perms };
- ps_process_pattern($3, $1_wine_t)
-
- domtrans_pattern($3, wine_exec_t, $1_wine_t)
-
- corecmd_bin_domtrans($1_wine_t, $3)
-
- userdom_manage_user_tmpfs_files($1_wine_t)
-
- domain_mmap_low($1_wine_t)
-
- tunable_policy(`wine_mmap_zero_ignore',`
- dontaudit $1_wine_t self:memprotect mmap_zero;
- ')
-
- optional_policy(`
- xserver_role($1_r, $1_wine_t)
- ')
- dnl
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `wine_role_template'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute the wine program in the wine domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`wine_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `wine_domtrans'($*)) dnl
-
- gen_require(`
- type wine_t, wine_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, wine_exec_t, wine_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `wine_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute wine in the wine domain,
-## and allow the specified role
-## the wine domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`wine_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `wine_run'($*)) dnl
-
- gen_require(`
- attribute_role wine_roles;
- ')
-
- wine_domtrans($1)
- roleattribute $2 wine_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `wine_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write wine Shared
-## memory segments.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`wine_rw_shm',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `wine_rw_shm'($*)) dnl
-
- gen_require(`
- type wine_t;
- ')
-
- allow $1 wine_t:shm rw_shm_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `wine_rw_shm'($*)) dnl
- ')
-
-## system-config-samba dbus service.
-## Log analyzer for squid proxy.
-
-########################################
-##
-## Execute the lightsquid program in
-## the lightsquid domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`lightsquid_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `lightsquid_domtrans'($*)) dnl
-
- gen_require(`
- type lightsquid_t, lightsquid_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, lightsquid_exec_t, lightsquid_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `lightsquid_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute lightsquid in the
-## lightsquid domain, and allow the
-## specified role the lightsquid domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`lightsquid_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `lightsquid_run'($*)) dnl
-
- gen_require(`
- attribute_role lightsquid_roles;
- ')
-
- lightsquid_domtrans($1)
- roleattribute $2 lightsquid_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `lightsquid_run'($*)) dnl
- ')
-
-
-########################################
-##
-## All of the rules required to
-## administrate an lightsquid environment.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`lightsquid_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `lightsquid_admin'($*)) dnl
-
- gen_require(`
- type lightsquid_t, lightsquid_rw_content_t;
- ')
-
- allow $1 lightsquid_t:process { ptrace signal_perms };
- ps_process_pattern($1, lightsquid_t)
-
- lightsquid_run($1, $2)
-
- files_search_var_lib($1)
- admin_pattern($1, lightsquid_rw_content_t)
-
- apache_list_sys_content($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `lightsquid_admin'($*)) dnl
- ')
-
-## IRC client policy.
-
-########################################
-##
-## Role access for IRC.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`irc_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `irc_role'($*)) dnl
-
- gen_require(`
- attribute_role irc_roles;
- type irc_t, irc_exec_t, irc_home_t;
- type irc_tmp_t, irc_log_home_t;
- ')
-
- ########################################
- #
- # Declarations
- #
-
- roleattribute $1 irc_roles;
-
- ########################################
- #
- # Policy
- #
-
- domtrans_pattern($2, irc_exec_t, irc_t)
-
- ps_process_pattern($2, irc_t)
- allow $2 irc_t:process { ptrace signal_perms };
-
- allow $2 { irc_home_t irc_log_home_t irc_tmp_t }:dir { manage_dir_perms relabel_dir_perms };
- allow $2 { irc_home_t irc_log_home_t irc_tmp_t }:file { manage_file_perms relabel_file_perms };
- allow $2 { irc_home_t irc_log_home_t irc_tmp_t }:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
- userdom_user_home_dir_filetrans($2, irc_home_t, dir, ".irssi")
- userdom_user_home_dir_filetrans($2, irc_home_t, file, ".ircmotd")
- userdom_user_home_dir_filetrans($2, irc_log_home_t, dir, "irclogs")
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `irc_role'($*)) dnl
- ')
-
-## VMWare Workstation virtual machines.
-
-########################################
-##
-## Role access for vmware.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`vmware_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `vmware_role'($*)) dnl
-
- gen_require(`
- type vmware_t, vmware_exec_t, vmware_file_t;
- type vmware_conf_t, vmware_tmp_t, vmware_tmpfs_t;
- ')
-
- role $1 types vmware_t;
-
- domtrans_pattern($2, vmware_exec_t, vmware_t)
-
- ps_process_pattern($2, vmware_t)
- allow $2 vmware_t:process { ptrace signal_perms };
-
- allow $2 { vmware_tmp_t vmware_file_t }:dir { manage_dir_perms relabel_dir_perms };
- allow $2 { vmware_conf_t vmware_file_t vmware_tmp_t vmware_tmpfs_t }:file { manage_file_perms relabel_file_perms };
- allow $2 { vmware_tmp_t vmware_tmpfs_t }:sock_file { manage_sock_file_perms relabel_sock_file_perms };
- allow $2 vmware_tmpfs_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
- allow $2 vmware_tmpfs_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
- userdom_user_home_dir_filetrans($2, vmware_file_t, dir, ".vmware")
- userdom_user_home_dir_filetrans($2, vmware_file_t, dir, "vmware")
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `vmware_role'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute vmware host executables
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`vmware_exec_host',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `vmware_exec_host'($*)) dnl
-
- gen_require(`
- type vmware_host_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, vmware_host_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `vmware_exec_host'($*)) dnl
- ')
-
-
-########################################
-##
-## Read vmware system configuration files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`vmware_read_system_config',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `vmware_read_system_config'($*)) dnl
-
- gen_require(`
- type vmware_sys_conf_t;
- ')
-
- files_search_etc($1)
- allow $1 vmware_sys_conf_t:file read_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `vmware_read_system_config'($*)) dnl
- ')
-
-
-########################################
-##
-## Append vmware system configuration files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`vmware_append_system_config',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `vmware_append_system_config'($*)) dnl
-
- gen_require(`
- type vmware_sys_conf_t;
- ')
-
- files_search_etc($1)
- allow $1 vmware_sys_conf_t:file append_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `vmware_append_system_config'($*)) dnl
- ')
-
-
-########################################
-##
-## Append vmware log files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`vmware_append_log',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `vmware_append_log'($*)) dnl
-
- gen_require(`
- type vmware_log_t;
- ')
-
- logging_search_logs($1)
- append_files_pattern($1, vmware_log_t, vmware_log_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `vmware_append_log'($*)) dnl
- ')
-
-## Modular screen saver and locker for X11.
-
-########################################
-##
-## Role access for xscreensaver.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`xscreensaver_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `xscreensaver_role'($*)) dnl
-
- gen_require(`
- attribute_role xscreensaver_roles;
- attribute_role xscreensaver_helper_roles;
- type xscreensaver_t, xscreensaver_exec_t;
- type xscreensaver_helper_t;
- type xscreensaver_config_t, xscreensaver_tmpfs_t;
- ')
-
- roleattribute $1 xscreensaver_roles;
- roleattribute $1 xscreensaver_helper_roles;
-
- domtrans_pattern($2, xscreensaver_exec_t, xscreensaver_t)
-
- allow $2 xscreensaver_t:process { ptrace signal_perms };
- ps_process_pattern($2, xscreensaver_t)
-
- allow $2 xscreensaver_config_t:file { manage_file_perms relabel_file_perms };
-
- allow $2 xscreensaver_tmpfs_t:dir { manage_dir_perms relabel_dir_perms };
- allow $2 xscreensaver_tmpfs_t:file { manage_file_perms relabel_file_perms };
-
- allow xscreensaver_helper_t $2:fd use;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `xscreensaver_role'($*)) dnl
- ')
-
-## system-config-firewall dbus system service.
-
-########################################
-##
-## Send and receive messages from
-## firewallgui over dbus.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`firewallgui_dbus_chat',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `firewallgui_dbus_chat'($*)) dnl
-
- gen_require(`
- type firewallgui_t;
- class dbus send_msg;
- ')
-
- allow $1 firewallgui_t:dbus send_msg;
- allow firewallgui_t $1:dbus send_msg;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `firewallgui_dbus_chat'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to read and
-## write firewallgui unnamed pipes.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`firewallgui_dontaudit_rw_pipes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `firewallgui_dontaudit_rw_pipes'($*)) dnl
-
- gen_require(`
- type firewallgui_t;
- ')
-
- dontaudit $1 firewallgui_t:fifo_file rw_fifo_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `firewallgui_dontaudit_rw_pipes'($*)) dnl
- ')
-
-## Restricted (scp/sftp) only shell.
-
-########################################
-##
-## Role access for rssh.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`rssh_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rssh_role'($*)) dnl
-
- gen_require(`
- attribute_role rssh_roles;
- type rssh_t, rssh_exec_t, rssh_ro_t;
- type rssh_rw_t;
- ')
-
- roleattribute $1 rssh_roles;
-
- domtrans_pattern($2, rssh_exec_t, rssh_t)
-
- allow $2 rssh_t:process { ptrace signal_perms };
- ps_process_pattern($2, rssh_t)
-
- allow $2 { rssh_ro_t rssh_rw_t }:dir { manage_dir_perms relabel_dir_perms };
- allow $2 { rssh_ro_t rssh_rw_t }:file { manage_file_perms relabel_file_perms };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rssh_role'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute rssh in the rssh domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`rssh_spec_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rssh_spec_domtrans'($*)) dnl
-
- gen_require(`
- type rssh_t, rssh_exec_t;
- ')
-
- corecmd_search_bin($1)
- spec_domtrans_pattern($1, rssh_exec_t, rssh_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rssh_spec_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute the rssh program
-## in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`rssh_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rssh_exec'($*)) dnl
-
- gen_require(`
- type rssh_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, rssh_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rssh_exec'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute a domain transition to
-## run rssh chroot helper.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`rssh_domtrans_chroot_helper',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rssh_domtrans_chroot_helper'($*)) dnl
-
- gen_require(`
- type rssh_chroot_helper_t, rssh_chroot_helper_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, rssh_chroot_helper_exec_t, rssh_chroot_helper_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rssh_domtrans_chroot_helper'($*)) dnl
- ')
-
-
-########################################
-##
-## Read users rssh read-only content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`rssh_read_ro_content',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rssh_read_ro_content'($*)) dnl
-
- gen_require(`
- type rssh_ro_t;
- ')
-
- allow $1 rssh_ro_t:dir list_dir_perms;
- allow $1 rssh_ro_t:file read_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rssh_read_ro_content'($*)) dnl
- ')
-
-## Podsleuth is a tool to get information about an Apple (TM) iPod (TM).
-
-########################################
-##
-## Execute a domain transition to run podsleuth.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`podsleuth_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `podsleuth_domtrans'($*)) dnl
-
- gen_require(`
- type podsleuth_t, podsleuth_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, podsleuth_exec_t, podsleuth_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `podsleuth_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute podsleuth in the podsleuth
-## domain, and allow the specified role
-## the podsleuth domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`podsleuth_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `podsleuth_run'($*)) dnl
-
- gen_require(`
- attribute_role podsleuth_roles;
- ')
-
- podsleuth_domtrans($1)
- roleattribute $2 podsleuth_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `podsleuth_run'($*)) dnl
- ')
-
-## GNU network object model environment.
-
-#######################################
-##
-## The role template for gnome.
-##
-##
-##
-## The prefix of the user domain (e.g., user
-## is the prefix for user_t).
-##
-##
-##
-##
-## The role associated with the user domain.
-##
-##
-##
-##
-## The type of the user domain.
-##
-##
-#
- define(`gnome_role_template',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_role_template'($*)) dnl
-
- gen_require(`
- attribute gnomedomain, gkeyringd_domain;
- attribute_role gconfd_roles;
- type gkeyringd_exec_t, gnome_keyring_home_t, gnome_keyring_tmp_t;
- type gconfd_t, gconfd_exec_t, gconf_tmp_t;
- type gconf_home_t, gnome_home_t;
- ')
-
- ########################################
- #
- # Gconf declarations
- #
-
- roleattribute $2 gconfd_roles;
-
- ########################################
- #
- # Gkeyringd declarations
- #
-
- type $1_gkeyringd_t, gnomedomain, gkeyringd_domain;
- userdom_user_application_domain($1_gkeyringd_t, gkeyringd_exec_t)
- domain_user_exemption_target($1_gkeyringd_t)
-
- role $2 types $1_gkeyringd_t;
-
- ########################################
- #
- # Gconf policy
- #
-
- domtrans_pattern($3, gconfd_exec_t, gconfd_t)
-
- allow $3 { gconf_home_t gconf_tmp_t }:dir { manage_dir_perms relabel_dir_perms };
- allow $3 { gconf_home_t gconf_tmp_t }:file { manage_file_perms relabel_file_perms };
- userdom_user_home_dir_filetrans($3, gconf_home_t, dir, ".gconf")
- userdom_user_home_dir_filetrans($3, gconf_home_t, dir, ".gconfd")
-
- allow $3 gconfd_t:process { ptrace signal_perms };
- ps_process_pattern($3, gconfd_t)
-
- ########################################
- #
- # Gkeyringd policy
- #
-
- domtrans_pattern($3, gkeyringd_exec_t, $1_gkeyringd_t)
-
- allow $3 { gnome_home_t gnome_keyring_home_t gnome_keyring_tmp_t }:dir { relabel_dir_perms manage_dir_perms };
- allow $3 { gnome_home_t gnome_keyring_home_t }:file { relabel_file_perms manage_file_perms };
-
- userdom_user_home_dir_filetrans($3, gnome_home_t, dir, ".gnome")
- userdom_user_home_dir_filetrans($3, gnome_home_t, dir, ".gnome2")
- userdom_user_home_dir_filetrans($3, gnome_home_t, dir, ".gnome2_private")
-
- gnome_home_filetrans($3, gnome_keyring_home_t, dir, "keyrings")
-
- allow $3 gnome_keyring_tmp_t:sock_file { relabel_sock_file_perms manage_sock_file_perms };
-
- ps_process_pattern($3, $1_gkeyringd_t)
- allow $3 $1_gkeyringd_t:process { ptrace signal_perms };
-
- corecmd_bin_domtrans($1_gkeyringd_t, $3)
- corecmd_shell_domtrans($1_gkeyringd_t, $3)
-
- gnome_stream_connect_gkeyringd($1, $3)
-
- optional_policy(`
- dbus_spec_session_domain($1, $1_gkeyringd_t, gkeyringd_exec_t)
- dbus_system_bus_client($1_gkeyringd_t)
-
- optional_policy(`
- evolution_dbus_chat($1_gkeyringd_t)
- ')
-
- optional_policy(`
- gnome_dbus_chat_gconfd($3)
- gnome_dbus_chat_gkeyringd($1, $3)
- ')
-
- optional_policy(`
- wm_dbus_chat($1, $1_gkeyringd_t)
- ')
- ')
- dnl
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_role_template'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute gconf in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gnome_exec_gconf',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_exec_gconf'($*)) dnl
-
- gen_require(`
- type gconfd_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, gconfd_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_exec_gconf'($*)) dnl
- ')
-
-
-########################################
-##
-## Read gconf configuration content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gnome_read_gconf_config',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_read_gconf_config'($*)) dnl
-
- gen_require(`
- type gconf_etc_t;
- ')
-
- files_search_etc($1)
- allow $1 gconf_etc_t:dir list_dir_perms;
- allow $1 gconf_etc_t:file read_file_perms;
- allow $1 gconf_etc_t:lnk_file read_lnk_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_read_gconf_config'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to read
-## inherited gconf configuration files.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`gnome_dontaudit_read_inherited_gconf_config_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_dontaudit_read_inherited_gconf_config_files'($*)) dnl
-
- gen_require(`
- type gconf_etc_t;
- ')
-
- dontaudit $1 gconf_etc_t:file read;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_dontaudit_read_inherited_gconf_config_files'($*)) dnl
- ')
-
-
-#######################################
-##
-## Create, read, write, and delete
-## gconf configuration content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gnome_manage_gconf_config',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_manage_gconf_config'($*)) dnl
-
- gen_require(`
- type gconf_etc_t;
- ')
-
- files_search_etc($1)
- allow $1 gconf_etc_t:dir manage_dir_perms;
- allow $1 gconf_etc_t:file manage_file_perms;
- allow $1 gconf_etc_t:lnk_file manage_lnk_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_manage_gconf_config'($*)) dnl
- ')
-
-
-########################################
-##
-## Connect to gconf using a unix
-## domain stream socket.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gnome_stream_connect_gconf',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_stream_connect_gconf'($*)) dnl
-
- gen_require(`
- type gconfd_t, gconf_tmp_t;
- ')
-
- files_search_tmp($1)
- stream_connect_pattern($1, gconf_tmp_t, gconf_tmp_t, gconfd_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_stream_connect_gconf'($*)) dnl
- ')
-
-
-########################################
-##
-## Run gconfd in gconfd domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`gnome_domtrans_gconfd',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_domtrans_gconfd'($*)) dnl
-
- gen_require(`
- type gconfd_t, gconfd_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, gconfd_exec_t, gconfd_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_domtrans_gconfd'($*)) dnl
- ')
-
-
-########################################
-##
-## Create generic gnome home directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gnome_create_generic_home_dirs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_create_generic_home_dirs'($*)) dnl
-
- gen_require(`
- type gnome_home_t;
- ')
-
- allow $1 gnome_home_t:dir create_dir_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_create_generic_home_dirs'($*)) dnl
- ')
-
-
-########################################
-##
-## Set attributes of generic gnome
-## user home directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gnome_setattr_generic_home_dirs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_setattr_generic_home_dirs'($*)) dnl
-
- gen_require(`
- type gnome_home_t;
- ')
-
- userdom_search_user_home_dirs($1)
- setattr_dirs_pattern($1, gnome_home_t, gnome_home_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_setattr_generic_home_dirs'($*)) dnl
- ')
-
-
-########################################
-##
-## Read generic gnome home content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gnome_read_generic_home_content',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_read_generic_home_content'($*)) dnl
-
- gen_require(`
- type gnome_home_t;
- ')
-
- userdom_search_user_home_dirs($1)
- allow $1 gnome_home_t:dir list_dir_perms;
- allow $1 gnome_home_t:file { read_file_perms map };
- allow $1 gnome_home_t:fifo_file read_fifo_file_perms;
- allow $1 gnome_home_t:lnk_file read_lnk_file_perms;
- allow $1 gnome_home_t:sock_file read_sock_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_read_generic_home_content'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## generic gnome home content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gnome_manage_generic_home_content',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_manage_generic_home_content'($*)) dnl
-
- gen_require(`
- type gnome_home_t;
- ')
-
- userdom_search_user_home_dirs($1)
- allow $1 gnome_home_t:dir manage_dir_perms;
- allow $1 gnome_home_t:file manage_file_perms;
- allow $1 gnome_home_t:fifo_file manage_fifo_file_perms;
- allow $1 gnome_home_t:lnk_file manage_lnk_file_perms;
- allow $1 gnome_home_t:sock_file manage_sock_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_manage_generic_home_content'($*)) dnl
- ')
-
-
-########################################
-##
-## Search generic gnome home directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gnome_search_generic_home',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_search_generic_home'($*)) dnl
-
- gen_require(`
- type gnome_home_t;
- ')
-
- userdom_search_user_home_dirs($1)
- allow $1 gnome_home_t:dir search_dir_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_search_generic_home'($*)) dnl
- ')
-
-
-########################################
-##
-## Create objects in gnome user home
-## directories with a private type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Private file type.
-##
-##
-##
-##
-## Class of the object being created.
-##
-##
-##
-##
-## The name of the object being created.
-##
-##
-#
- define(`gnome_home_filetrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_home_filetrans'($*)) dnl
-
- gen_require(`
- type gnome_home_t;
- ')
-
- userdom_search_user_home_dirs($1)
- filetrans_pattern($1, gnome_home_t, $2, $3, $4)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_home_filetrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Create generic gconf home directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gnome_create_generic_gconf_home_dirs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_create_generic_gconf_home_dirs'($*)) dnl
-
- gen_require(`
- type gconf_home_t;
- ')
-
- allow $1 gconf_home_t:dir create_dir_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_create_generic_gconf_home_dirs'($*)) dnl
- ')
-
-
-########################################
-##
-## Read generic gconf home content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gnome_read_generic_gconf_home_content',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_read_generic_gconf_home_content'($*)) dnl
-
- gen_require(`
- type gconf_home_t;
- ')
-
- userdom_search_user_home_dirs($1)
- allow $1 gconf_home_t:dir list_dir_perms;
- allow $1 gconf_home_t:file read_file_perms;
- allow $1 gconf_home_t:fifo_file read_fifo_file_perms;
- allow $1 gconf_home_t:lnk_file read_lnk_file_perms;
- allow $1 gconf_home_t:sock_file read_sock_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_read_generic_gconf_home_content'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## generic gconf home content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gnome_manage_generic_gconf_home_content',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_manage_generic_gconf_home_content'($*)) dnl
-
- gen_require(`
- type gconf_home_t;
- ')
-
- userdom_search_user_home_dirs($1)
- allow $1 gconf_home_t:dir manage_dir_perms;
- allow $1 gconf_home_t:file manage_file_perms;
- allow $1 gconf_home_t:fifo_file manage_fifo_file_perms;
- allow $1 gconf_home_t:lnk_file manage_lnk_file_perms;
- allow $1 gconf_home_t:sock_file manage_sock_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_manage_generic_gconf_home_content'($*)) dnl
- ')
-
-
-########################################
-##
-## Search generic gconf home directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gnome_search_generic_gconf_home',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_search_generic_gconf_home'($*)) dnl
-
- gen_require(`
- type gconf_home_t;
- ')
-
- userdom_search_user_home_dirs($1)
- allow $1 gconf_home_t:dir search_dir_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_search_generic_gconf_home'($*)) dnl
- ')
-
-
-########################################
-##
-## Create objects in user home
-## directories with the generic gconf
-## home type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Class of the object being created.
-##
-##
-##
-##
-## The name of the object being created.
-##
-##
-#
- define(`gnome_home_filetrans_gconf_home',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_home_filetrans_gconf_home'($*)) dnl
-
- gen_require(`
- type gconf_home_t;
- ')
-
- userdom_user_home_dir_filetrans($1, gconf_home_t, $2, $3)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_home_filetrans_gconf_home'($*)) dnl
- ')
-
-
-########################################
-##
-## Create objects in user home
-## directories with the generic gnome
-## home type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Class of the object being created.
-##
-##
-##
-##
-## The name of the object being created.
-##
-##
-#
- define(`gnome_home_filetrans_gnome_home',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_home_filetrans_gnome_home'($*)) dnl
-
- gen_require(`
- type gnome_home_t;
- ')
-
- userdom_user_home_dir_filetrans($1, gnome_home_t, $2, $3)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_home_filetrans_gnome_home'($*)) dnl
- ')
-
-
-########################################
-##
-## Create objects in gnome gconf home
-## directories with a private type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Private file type.
-##
-##
-##
-##
-## Class of the object being created.
-##
-##
-##
-##
-## The name of the object being created.
-##
-##
-#
- define(`gnome_gconf_home_filetrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_gconf_home_filetrans'($*)) dnl
-
- gen_require(`
- type gconf_home_t;
- ')
-
- userdom_search_user_home_dirs($1)
- filetrans_pattern($1, gconf_home_t, $2, $3, $4)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_gconf_home_filetrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Create objects in user home
-## directories with the gstreamer
-## orcexec type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Class of the object being created.
-##
-##
-##
-##
-## The name of the object being created.
-##
-##
-#
- define(`gnome_user_home_dir_filetrans_gstreamer_orcexec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_user_home_dir_filetrans_gstreamer_orcexec'($*)) dnl
-
- gen_require(`
- type gstreamer_orcexec_t;
- ')
-
- userdom_user_home_dir_filetrans($1, gstreamer_orcexec_t, $2, $3)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_user_home_dir_filetrans_gstreamer_orcexec'($*)) dnl
- ')
-
-
-########################################
-##
-## Create objects in the user
-## runtime directories with the
-## gstreamer orcexec type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Class of the object being created.
-##
-##
-##
-##
-## The name of the object being created.
-##
-##
-#
- define(`gnome_user_runtime_filetrans_gstreamer_orcexec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_user_runtime_filetrans_gstreamer_orcexec'($*)) dnl
-
- gen_require(`
- type gstreamer_orcexec_t;
- ')
-
- userdom_user_runtime_filetrans($1, gstreamer_orcexec_t, $2, $3)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_user_runtime_filetrans_gstreamer_orcexec'($*)) dnl
- ')
-
-
-########################################
-##
-## Read generic gnome keyring home files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gnome_read_keyring_home_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_read_keyring_home_files'($*)) dnl
-
- gen_require(`
- type gnome_home_t, gnome_keyring_home_t;
- ')
-
- userdom_search_user_home_dirs($1)
- read_files_pattern($1, { gnome_home_t gnome_keyring_home_t }, gnome_keyring_home_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_read_keyring_home_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive messages from
-## gnome configuration daemon over
-## dbus.
-##
-##
-##
-## The prefix of the user domain (e.g., user
-## is the prefix for user_t).
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gnome_dbus_chat_gconfd',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_dbus_chat_gconfd'($*)) dnl
-
- gen_require(`
- type gconfd_t;
- class dbus send_msg;
- ')
-
- allow $1 gconfd_t:dbus send_msg;
- allow gconfd_t $1:dbus send_msg;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_dbus_chat_gconfd'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive messages from
-## gnome keyring daemon over dbus.
-##
-##
-##
-## The prefix of the user domain (e.g., user
-## is the prefix for user_t).
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gnome_dbus_chat_gkeyringd',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_dbus_chat_gkeyringd'($*)) dnl
-
- gen_require(`
- type $1_gkeyringd_t;
- class dbus send_msg;
- ')
-
- allow $2 $1_gkeyringd_t:dbus send_msg;
- allow $1_gkeyringd_t $2:dbus send_msg;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_dbus_chat_gkeyringd'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive messages from all
-## gnome keyring daemon over dbus.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gnome_dbus_chat_all_gkeyringd',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_dbus_chat_all_gkeyringd'($*)) dnl
-
- gen_require(`
- attribute gkeyringd_domain;
- class dbus send_msg;
- ')
-
- allow $1 gkeyringd_domain:dbus send_msg;
- allow gkeyringd_domain $1:dbus send_msg;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_dbus_chat_all_gkeyringd'($*)) dnl
- ')
-
-
-########################################
-##
-## Run all gkeyringd in gkeyringd domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`gnome_spec_domtrans_all_gkeyringd',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_spec_domtrans_all_gkeyringd'($*)) dnl
-
- gen_require(`
- attribute gkeyringd_domain;
- type gkeyringd_exec_t;
- ')
-
- corecmd_search_bin($1)
- spec_domtrans_pattern($1, gkeyringd_exec_t, gkeyringd_domain)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_spec_domtrans_all_gkeyringd'($*)) dnl
- ')
-
-
-########################################
-##
-## Connect to gnome keyring daemon
-## with a unix stream socket.
-##
-##
-##
-## The prefix of the user domain (e.g., user
-## is the prefix for user_t).
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gnome_stream_connect_gkeyringd',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_stream_connect_gkeyringd'($*)) dnl
-
- gen_require(`
- type $1_gkeyringd_t, gnome_keyring_tmp_t;
- ')
-
- files_search_tmp($2)
- userdom_search_user_runtime($2)
- stream_connect_pattern($2, gnome_keyring_tmp_t, gnome_keyring_tmp_t, $1_gkeyringd_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_stream_connect_gkeyringd'($*)) dnl
- ')
-
-
-########################################
-##
-## Connect to all gnome keyring daemon
-## with a unix stream socket.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gnome_stream_connect_all_gkeyringd',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_stream_connect_all_gkeyringd'($*)) dnl
-
- gen_require(`
- attribute gkeyringd_domain;
- type gnome_keyring_tmp_t;
- ')
-
- files_search_tmp($1)
- userdom_search_user_runtime($1)
- stream_connect_pattern($1, gnome_keyring_tmp_t, gnome_keyring_tmp_t, gkeyringd_domain)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_stream_connect_all_gkeyringd'($*)) dnl
- ')
-
-
-########################################
-##
-## Manage gstreamer ORC optimized
-## code.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gnome_manage_gstreamer_orcexec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_manage_gstreamer_orcexec'($*)) dnl
-
- gen_require(`
- type gstreamer_orcexec_t;
- ')
-
- allow $1 gstreamer_orcexec_t:file manage_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_manage_gstreamer_orcexec'($*)) dnl
- ')
-
-
-########################################
-##
-## Mmap gstreamer ORC optimized
-## code.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gnome_mmap_gstreamer_orcexec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gnome_mmap_gstreamer_orcexec'($*)) dnl
-
- gen_require(`
- type gstreamer_orcexec_t;
- ')
-
- allow $1 gstreamer_orcexec_t:file mmap_exec_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gnome_mmap_gstreamer_orcexec'($*)) dnl
- ')
-
-## Application that lets you synchronize your files across multiple devices.
-
-########################################
-##
-## Role access for Syncthing
-##
-##
-##
-## Role allowed access
-##
-##
-##
-##
-## User domain for the role
-##
-##
-#
- define(`syncthing_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `syncthing_role'($*)) dnl
-
- gen_require(`
- attribute_role syncthing_roles;
- type syncthing_t, syncthing_exec_t, syncthing_xdg_config_t;
- ')
-
- roleattribute $1 syncthing_roles;
-
- domtrans_pattern($2, syncthing_exec_t, syncthing_t)
-
- allow $2 syncthing_xdg_config_t:file { manage_file_perms relabel_file_perms };
- allow $2 syncthing_xdg_config_t:dir { manage_dir_perms relabel_dir_perms };
- allow $2 syncthing_xdg_config_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `syncthing_role'($*)) dnl
- ')
-
-## CryFS and similar other tools which mount encrypted directories using FUSE.
-
-########################################
-##
-## Role access for CryFS.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`cryfs_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `cryfs_role'($*)) dnl
-
- gen_require(`
- attribute_role cryfs_roles;
- type cryfs_t, cryfs_exec_t;
- ')
-
- ########################################
- #
- # Declarations
- #
-
- roleattribute $1 cryfs_roles;
-
- ########################################
- #
- # Policy
- #
-
- domtrans_pattern($2, cryfs_exec_t, cryfs_t)
-
- allow $2 cryfs_t:process signal_perms;
- ps_process_pattern($2, cryfs_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `cryfs_role'($*)) dnl
- ')
-
-## A wrapper that helps users run system programs.
-
-#######################################
-##
-## The role template for the userhelper module.
-##
-##
-##
-## The prefix of the user role (e.g., user
-## is the prefix for user_r).
-##
-##
-##
-##
-## The user role.
-##
-##
-##
-##
-## The user domain associated with the role.
-##
-##
-#
- define(`userhelper_role_template',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `userhelper_role_template'($*)) dnl
-
- gen_require(`
- attribute userhelper_type, consolehelper_type;
- attribute_role userhelper_roles, consolehelper_roles;
- type userhelper_exec_t, consolehelper_exec_t;
- ')
-
- ########################################
- #
- # Declarations
- #
-
- type $1_consolehelper_t, consolehelper_type;
- userdom_user_application_domain($1_consolehelper_t, consolehelper_exec_t)
-
- role consolehelper_roles types $1_consolehelper_t;
- roleattribute $2 consolehelper_roles;
-
- type $1_userhelper_t, userhelper_type;
- userdom_user_application_domain($1_userhelper_t, userhelper_exec_t)
-
- domain_role_change_exemption($1_userhelper_t)
- domain_obj_id_change_exemption($1_userhelper_t)
- domain_interactive_fd($1_userhelper_t)
- domain_subj_id_change_exemption($1_userhelper_t)
-
- role userhelper_roles types $1_userhelper_t;
- roleattribute $2 userhelper_roles;
-
- ########################################
- #
- # Consolehelper local policy
- #
-
- allow $1_consolehelper_t $3:unix_stream_socket connectto;
-
- domtrans_pattern($3, consolehelper_exec_t, $1_consolehelper_t)
-
- allow $3 $1_consolehelper_t:process { ptrace signal_perms };
- ps_process_pattern($3, $1_consolehelper_t)
-
- auth_use_pam($1_consolehelper_t)
-
- optional_policy(`
- dbus_connect_all_session_bus($1_consolehelper_t)
-
- optional_policy(`
- userhelper_dbus_chat_all_consolehelper($3)
- ')
- ')
-
- ########################################
- #
- # Userhelper local policy
- #
-
- domtrans_pattern($3, userhelper_exec_t, $1_userhelper_t)
-
- dontaudit $3 $1_userhelper_t:process signal;
-
- corecmd_bin_domtrans($1_userhelper_t, $3)
-
- auth_domtrans_chk_passwd($1_userhelper_t)
- auth_use_nsswitch($1_userhelper_t)
-
- userdom_bin_spec_domtrans_unpriv_users($1_userhelper_t)
- userdom_entry_spec_domtrans_unpriv_users($1_userhelper_t)
-
- optional_policy(`
- tunable_policy(`! secure_mode',`
- sysadm_bin_spec_domtrans($1_userhelper_t)
- sysadm_entry_spec_domtrans($1_userhelper_t)
- ')
- ')
- dnl
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `userhelper_role_template'($*)) dnl
- ')
-
-
-########################################
-##
-## Search userhelper configuration directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`userhelper_search_config',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `userhelper_search_config'($*)) dnl
-
- gen_require(`
- type userhelper_conf_t;
- ')
-
- allow $1 userhelper_conf_t:dir search_dir_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `userhelper_search_config'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to search
-## userhelper configuration directories.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`userhelper_dontaudit_search_config',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `userhelper_dontaudit_search_config'($*)) dnl
-
- gen_require(`
- type userhelper_conf_t;
- ')
-
- dontaudit $1 userhelper_conf_t:dir search_dir_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `userhelper_dontaudit_search_config'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive messages from
-## consolehelper over dbus.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`userhelper_dbus_chat_all_consolehelper',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `userhelper_dbus_chat_all_consolehelper'($*)) dnl
-
- gen_require(`
- attribute consolehelper_type;
- class dbus send_msg;
- ')
-
- allow $1 consolehelper_type:dbus send_msg;
- allow consolehelper_type $1:dbus send_msg;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `userhelper_dbus_chat_all_consolehelper'($*)) dnl
- ')
-
-
-########################################
-##
-## Use userhelper all userhelper file descriptors.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`userhelper_use_fd',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `userhelper_use_fd'($*)) dnl
-
- gen_require(`
- attribute userhelper_type;
- ')
-
- allow $1 userhelper_type:fd use;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `userhelper_use_fd'($*)) dnl
- ')
-
-
-########################################
-##
-## Send child terminated signals to all userhelper.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`userhelper_sigchld',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `userhelper_sigchld'($*)) dnl
-
- gen_require(`
- attribute userhelper_type;
- ')
-
- allow $1 userhelper_type:process sigchld;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `userhelper_sigchld'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute the userhelper program in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`userhelper_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `userhelper_exec'($*)) dnl
-
- gen_require(`
- type userhelper_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, userhelper_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `userhelper_exec'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute the consolehelper program
-## in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`userhelper_exec_consolehelper',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `userhelper_exec_consolehelper'($*)) dnl
-
- gen_require(`
- type consolehelper_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, consolehelper_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `userhelper_exec_consolehelper'($*)) dnl
- ')
-
-## Record audio or data Compact Discs from a master.
-
-########################################
-##
-## Role access for cdrecord.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`cdrecord_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `cdrecord_role'($*)) dnl
-
- gen_require(`
- attribute_role cdrecord_roles;
- type cdrecord_t, cdrecord_exec_t;
- ')
-
- roleattribute $1 cdrecord_roles;
-
- domtrans_pattern($2, cdrecord_exec_t, cdrecord_t)
-
- allow cdrecord_t $2:unix_stream_socket rw_socket_perms;
-
- allow $2 cdrecord_t:process { ptrace signal_perms };
- ps_process_pattern($2, cdrecord_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `cdrecord_role'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute cdrecord in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`cdrecord_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `cdrecord_exec'($*)) dnl
-
- gen_require(`
- type cdrecord_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, cdrecord_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `cdrecord_exec'($*)) dnl
- ')
-
-## Load keyboard mappings.
-
-########################################
-##
-## Execute the loadkeys program in
-## the loadkeys domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`loadkeys_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `loadkeys_domtrans'($*)) dnl
-
- gen_require(`
- type loadkeys_t, loadkeys_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, loadkeys_exec_t, loadkeys_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `loadkeys_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute the loadkeys program in
-## the loadkeys domain, and allow the
-## specified role the loadkeys domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`loadkeys_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `loadkeys_run'($*)) dnl
-
- gen_require(`
- attribute_role loadkeys_roles;
- ')
-
- loadkeys_domtrans($1)
- roleattribute $2 loadkeys_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `loadkeys_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute the loadkeys in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`loadkeys_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `loadkeys_exec'($*)) dnl
-
- gen_require(`
- type loadkeys_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, loadkeys_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `loadkeys_exec'($*)) dnl
- ')
-
-## GNU terminal multiplexer.
-
-#######################################
-##
-## The role template for the screen module.
-##
-##
-##
-## The prefix of the user role (e.g., user
-## is the prefix for user_r).
-##
-##
-##
-##
-## The role associated with the user domain.
-##
-##
-##
-##
-## The type of the user domain.
-##
-##
-#
- define(`screen_role_template',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `screen_role_template'($*)) dnl
-
- gen_require(`
- attribute screen_domain;
- attribute_role screen_roles;
- type screen_exec_t, screen_tmp_t;
- type screen_home_t, screen_runtime_t;
- ')
-
- ########################################
- #
- # Declarations
- #
-
- type $1_screen_t, screen_domain;
- userdom_user_application_domain($1_screen_t, screen_exec_t)
- domain_interactive_fd($1_screen_t)
- role screen_roles types $1_screen_t;
-
- roleattribute $2 screen_roles;
-
- ########################################
- #
- # Local policy
- #
-
- dontaudit $1_screen_t self:capability sys_tty_config;
-
- domtrans_pattern($3, screen_exec_t, $1_screen_t)
-
- ps_process_pattern($3, $1_screen_t)
- allow $3 $1_screen_t:process { ptrace signal_perms };
-
- dontaudit $3 $1_screen_t:unix_stream_socket { read write };
- allow $1_screen_t $3:process signal;
-
- allow $3 screen_tmp_t:dir { manage_dir_perms relabel_dir_perms };
- allow $3 screen_tmp_t:file { manage_file_perms relabel_file_perms };
- allow $3 screen_tmp_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
-
- allow $3 screen_home_t:dir { manage_dir_perms relabel_dir_perms };
- allow $3 screen_home_t:file { manage_file_perms relabel_file_perms };
- allow $3 screen_home_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
- allow $3 screen_home_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
-
- userdom_user_home_dir_filetrans($3, screen_home_t, dir, ".screen")
- userdom_user_home_dir_filetrans($3, screen_home_t, file, ".screenrc")
- userdom_user_home_dir_filetrans($3, screen_home_t, file, ".tmux.conf")
-
- manage_dirs_pattern($3, screen_runtime_t, screen_runtime_t)
- manage_files_pattern($3, screen_runtime_t, screen_runtime_t)
- manage_lnk_files_pattern($3, screen_runtime_t, screen_runtime_t)
- manage_fifo_files_pattern($3, screen_runtime_t, screen_runtime_t)
-
- corecmd_bin_domtrans($1_screen_t, $3)
- corecmd_shell_domtrans($1_screen_t, $3)
-
- auth_domtrans_chk_passwd($1_screen_t)
- auth_use_nsswitch($1_screen_t)
-
- userdom_user_home_domtrans($1_screen_t, $3)
-
- tunable_policy(`use_samba_home_dirs',`
- fs_cifs_domtrans($1_screen_t, $3)
- ')
-
- tunable_policy(`use_nfs_home_dirs',`
- fs_nfs_domtrans($1_screen_t, $3)
- ')
- dnl
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `screen_role_template'($*)) dnl
- ')
-
-## Peer to peer file sharing tool.
-
-########################################
-##
-## Role access for gift.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`gift_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gift_role'($*)) dnl
-
- gen_require(`
- attribute_role gift_roles, giftd_roles;
- type gift_t, gift_exec_t, gift_home_t;
- type giftd_t, giftd_exec_t, gift_tmpfs_t;
- ')
-
- roleattribute $1 gift_roles;
- roleattribute $1 giftd_roles;
-
- domtrans_pattern($2, gift_exec_t, gift_t)
- domtrans_pattern($2, giftd_exec_t, giftd_t)
-
- allow $2 gift_home_t:dir { manage_dir_perms relabel_dir_perms };
- allow $2 { gift_home_t gift_tmpfs_t }:file { manage_file_perms relabel_file_perms };
- allow $2 { gift_home_t gift_tmpfs_t }:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
- allow $2 gift_tmpfs_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
- allow $2 gift_tmpfs_t:sock_file { manage_sock_file_perms relabel_sock_file_perms };
- userdom_user_home_dir_filetrans($2, gift_home_t, dir, ".giFT")
-
- ps_process_pattern($2, { gift_t giftd_t })
- allow $2 { gift_t giftd_t }:process { ptrace signal_perms };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gift_role'($*)) dnl
- ')
-
-## Evolution email client.
-
-########################################
-##
-## Role access for evolution.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`evolution_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `evolution_role'($*)) dnl
-
- gen_require(`
- attribute_role evolution_roles;
- type evolution_t, evolution_exec_t, evolution_home_t;
- type evolution_alarm_t, evolution_alarm_exec_t, evolution_alarm_orbit_tmp_t;
- type evolution_exchange_t, evolution_exchange_exec_t, evolution_exchange_tmp_t;
- type evolution_exchange_orbit_tmp_t, evolution_orbit_tmp_t, evolution_server_orbit_tmp_t;
- type evolution_server_t, evolution_server_exec_t, evolution_webcal_t;
- type evolution_webcal_exec_t, evolution_alarm_tmpfs_t, evolution_exchange_tmpfs_t;
- type evolution_tmpfs_t, evolution_webcal_tmpfs_t;
- ')
-
- roleattribute $1 evolution_roles;
-
- domtrans_pattern($2, evolution_exec_t, evolution_t)
- domtrans_pattern($2, evolution_alarm_exec_t, evolution_alarm_t)
- domtrans_pattern($2, evolution_exchange_exec_t, evolution_exchange_t)
- domtrans_pattern($2, evolution_server_exec_t, evolution_server_t)
- domtrans_pattern($2, evolution_webcal_exec_t, evolution_webcal_t)
-
- allow $2 { evolution_t evolution_alarm_t evolution_exchange_t evolution_server_t evolution_webcal_t }:process { noatsecure ptrace signal_perms };
- ps_process_pattern($2, { evolution_t evolution_alarm_t evolution_exchange_t })
- ps_process_pattern($2, { evolution_server_t evolution_webcal_t })
-
- allow evolution_t $2:dir search_dir_perms;
- allow evolution_t $2:file read_file_perms;
- allow evolution_t $2:lnk_file read_lnk_file_perms;
-
- allow $2 evolution_home_t:dir { relabel_dir_perms manage_dir_perms };
- allow $2 evolution_home_t:file { relabel_file_perms manage_file_perms };
- allow $2 evolution_home_t:lnk_file { relabel_lnk_file_perms manage_lnk_file_perms };
-
- userdom_user_home_dir_filetrans($2, evolution_home_t, dir, ".camel_certs")
- userdom_user_home_dir_filetrans($2, evolution_home_t, dir, ".evolution")
-
- allow $2 evolution_exchange_tmp_t:dir { manage_dir_perms relabel_dir_perms };
- allow $2 { evolution_alarm_orbit_tmp_t evolution_exchange_orbit_tmp_t evolution_orbit_tmp_t evolution_server_orbit_tmp_t }:sock_file { manage_sock_file_perms relabel_sock_file_perms };
-
- allow $2 { evolution_alarm_tmpfs_t evolution_exchange_tmpfs_t evolution_tmpfs_t evolution_webcal_tmpfs_t }:dir { manage_dir_perms relabel_dir_perms };
- allow $2 { evolution_alarm_tmpfs_t evolution_exchange_tmpfs_t evolution_tmpfs_t evolution_webcal_tmpfs_t }:file { manage_file_perms relabel_file_perms };
- allow $2 { evolution_alarm_tmpfs_t evolution_exchange_tmpfs_t evolution_tmpfs_t evolution_webcal_tmpfs_t }:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
- allow $2 { evolution_alarm_tmpfs_t evolution_exchange_tmpfs_t evolution_tmpfs_t evolution_webcal_tmpfs_t }:sock_file { manage_sock_file_perms relabel_sock_file_perms };
- allow $2 { evolution_alarm_tmpfs_t evolution_exchange_tmpfs_t evolution_tmpfs_t evolution_webcal_tmpfs_t }:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
-
- allow { evolution_t evolution_exchange_t } $2:unix_stream_socket connectto;
-
- stream_connect_pattern($2, evolution_orbit_tmp_t, evolution_orbit_tmp_t, evolution_t)
- stream_connect_pattern($2, evolution_exchange_orbit_tmp_t, evolution_exchange_orbit_tmp_t, evolution_exchange_t)
-
- optional_policy(`
- evolution_dbus_chat($2)
- evolution_alarm_dbus_chat($2)
- ')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `evolution_role'($*)) dnl
- ')
-
-
-########################################
-##
-## Create objects in the evolution home
-## directories with a private type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Private file type.
-##
-##
-##
-##
-## Class of the object being created.
-##
-##
-##
-##
-## The name of the object being created.
-##
-##
-#
- define(`evolution_home_filetrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `evolution_home_filetrans'($*)) dnl
-
- gen_require(`
- type evolution_home_t;
- ')
-
- userdom_search_user_home_dirs($1)
- filetrans_pattern($1, evolution_home_t, $2, $3, $4)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `evolution_home_filetrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Read evolution home files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`evolution_read_home_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `evolution_read_home_files'($*)) dnl
-
- gen_require(`
- type evolution_home_t;
- ')
-
- read_files_pattern($1, evolution_home_t, evolution_home_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `evolution_read_home_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Connect to evolution using a unix
-## domain stream socket.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`evolution_stream_connect',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `evolution_stream_connect'($*)) dnl
-
- gen_require(`
- type evolution_t, evolution_orbit_tmp_t;
- ')
-
-
- files_search_tmp($1)
- stream_connect_pattern($1, evolution_orbit_tmp_t, evolution_orbit_tmp_t, evolution_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `evolution_stream_connect'($*)) dnl
- ')
-
-
-########################################
-##
-## Read evolution orbit temporary
-## files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`evolution_read_orbit_tmp_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `evolution_read_orbit_tmp_files'($*)) dnl
-
- gen_require(`
- type evolution_orbit_tmp_t;
- ')
-
- files_search_tmp($1)
- read_files_pattern($1, evolution_orbit_tmp_t, evolution_orbit_tmp_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `evolution_read_orbit_tmp_files'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send and receive messages from
-## evolution over dbus.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`evolution_dbus_chat',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `evolution_dbus_chat'($*)) dnl
-
- gen_require(`
- type evolution_t;
- class dbus send_msg;
- ')
-
- allow $1 evolution_t:dbus send_msg;
- allow evolution_t $1:dbus send_msg;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `evolution_dbus_chat'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive messages from
-## evolution_alarm over dbus.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`evolution_alarm_dbus_chat',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `evolution_alarm_dbus_chat'($*)) dnl
-
- gen_require(`
- type evolution_alarm_t;
- class dbus send_msg;
- ')
-
- allow $1 evolution_alarm_t:dbus send_msg;
- allow evolution_alarm_t $1:dbus send_msg;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `evolution_alarm_dbus_chat'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a domain transition to the
-## evolution target domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`evolution_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `evolution_domtrans'($*)) dnl
-
- gen_require(`
- type evolution_t, evolution_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, evolution_exec_t, evolution_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `evolution_domtrans'($*)) dnl
- ')
-
-## Various games.
-
-########################################
-##
-## Role access for games.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`games_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `games_role'($*)) dnl
-
- gen_require(`
- attribute_role games_roles;
- type games_t, games_exec_t, games_tmp_t;
- type games_tmpfs_t;
- ')
-
- roleattribute $1 games_roles;
-
- domtrans_pattern($2, games_exec_t, games_t)
-
- allow $2 games_tmp_t:dir { manage_dir_perms relabel_dir_perms };
- allow $2 { games_tmp_t games_tmpfs_t }:file { manage_file_perms relabel_file_perms };
- allow $2 games_tmpfs_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
- allow $2 games_tmpfs_t:sock_file { manage_sock_file_perms relabel_sock_file_perms };
-
- allow $2 games_t:process { ptrace signal_perms };
- ps_process_pattern($2, games_t)
-
- stream_connect_pattern($2, games_tmpfs_t, games_tmpfs_t, games_t)
-
- allow games_t $2:unix_stream_socket connectto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `games_role'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write games data files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`games_rw_data',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `games_rw_data'($*)) dnl
-
- gen_require(`
- type games_data_t;
- ')
-
- files_search_var_lib($1)
- rw_files_pattern($1, games_data_t, games_data_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `games_rw_data'($*)) dnl
- ')
-
-
-########################################
-##
-## Run a game in the game domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`games_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `games_domtrans'($*)) dnl
-
- gen_require(`
- type games_t, games_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, games_exec_t, games_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `games_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive messages from
-## games over dbus.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`games_dbus_chat',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `games_dbus_chat'($*)) dnl
-
- gen_require(`
- type games_t;
- class dbus send_msg;
- ')
-
- allow $1 games_t:dbus send_msg;
- allow games_t $1:dbus send_msg;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `games_dbus_chat'($*)) dnl
- ')
-
-## GNAT Ada95 compiler.
-
-########################################
-##
-## Execute the ada program in the ada domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`ada_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `ada_domtrans'($*)) dnl
-
- gen_require(`
- type ada_t, ada_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, ada_exec_t, ada_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `ada_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute ada in the ada domain, and
-## allow the specified role the ada domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`ada_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `ada_run'($*)) dnl
-
- gen_require(`
- attribute_role ada_roles;
- ')
-
- ada_domtrans($1)
- roleattribute $2 ada_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `ada_run'($*)) dnl
- ')
-
-## Web server log analysis.
-
-########################################
-##
-## Execute webalizer in the webalizer domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`webalizer_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `webalizer_domtrans'($*)) dnl
-
- gen_require(`
- type webalizer_t, webalizer_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, webalizer_exec_t, webalizer_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `webalizer_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute webalizer in the webalizer
-## domain, and allow the specified
-## role the webalizer domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`webalizer_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `webalizer_run'($*)) dnl
-
- gen_require(`
- attribute_role webalizer_roles;
- ')
-
- webalizer_domtrans($1)
- roleattribute $2 webalizer_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `webalizer_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Manage webalizer usage files
-##
-##
-##
-## Domain allowed to manage webalizer usage files
-##
-##
-##
-#
- define(`manage_webalizer_var_lib',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `manage_webalizer_var_lib'($*)) dnl
-
- gen_require(`
- type webalizer_var_lib_t;
- ')
-
- allow $1 webalizer_var_lib_t:dir manage_dir_perms;
- allow $1 webalizer_var_lib_t:file manage_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `manage_webalizer_var_lib'($*)) dnl
- ')
-
-## Tool for building alternate livecd for different os and policy versions.
-
-########################################
-##
-## Execute a domain transition to run livecd.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`livecd_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `livecd_domtrans'($*)) dnl
-
- gen_require(`
- type livecd_t, livecd_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, livecd_exec_t, livecd_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `livecd_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute livecd in the livecd
-## domain, and allow the specified
-## role the livecd domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`livecd_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `livecd_run'($*)) dnl
-
- gen_require(`
- attribute_role livecd_roles;
- ')
-
- livecd_domtrans($1)
- roleattribute $2 livecd_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `livecd_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Read livecd temporary files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`livecd_read_tmp_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `livecd_read_tmp_files'($*)) dnl
-
- gen_require(`
- type livecd_tmp_t;
- ')
-
- files_search_tmp($1)
- read_files_pattern($1, livecd_tmp_t, livecd_tmp_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `livecd_read_tmp_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write livecd temporary files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`livecd_rw_tmp_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `livecd_rw_tmp_files'($*)) dnl
-
- gen_require(`
- type livecd_tmp_t;
- ')
-
- files_search_tmp($1)
- rw_files_pattern($1, livecd_tmp_t, livecd_tmp_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `livecd_rw_tmp_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write livecd semaphores.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`livecd_rw_semaphores',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `livecd_rw_semaphores'($*)) dnl
-
- gen_require(`
- type livecd_t;
- ')
-
- allow $1 livecd_t:sem rw_sem_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `livecd_rw_semaphores'($*)) dnl
- ')
-
-## Log file analyzer for advanced statistics.
-
-########################################
-##
-## Execute the awstats program in
-## the awstats domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`awstats_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `awstats_domtrans'($*)) dnl
-
- gen_require(`
- type awstats_t, awstats_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, awstats_exec_t, awstats_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `awstats_domtrans'($*)) dnl
- ')
-
-## Filesystem namespacing/polyinstantiation application.
-
-########################################
-##
-## Execute a domain transition to run seunshare.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`seunshare_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `seunshare_domtrans'($*)) dnl
-
- gen_require(`
- type seunshare_t, seunshare_exec_t;
- ')
-
- domtrans_pattern($1, seunshare_exec_t, seunshare_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `seunshare_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute seunshare in the seunshare domain, and
-## allow the specified role the seunshare domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`seunshare_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `seunshare_run'($*)) dnl
-
- gen_require(`
- type seunshare_t;
- ')
-
- seunshare_domtrans($1)
- role $2 types seunshare_t;
-
- allow $1 seunshare_t:process signal_perms;
-
- ifdef(`hide_broken_symptoms', `
- dontaudit seunshare_t $1:tcp_socket rw_socket_perms;
- dontaudit seunshare_t $1:udp_socket rw_socket_perms;
- dontaudit seunshare_t $1:unix_stream_socket rw_socket_perms;
- ')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `seunshare_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Role access for seunshare
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`seunshare_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `seunshare_role'($*)) dnl
-
- gen_require(`
- type seunshare_t;
- ')
-
- role $2 types seunshare_t;
-
- seunshare_domtrans($1)
-
- ps_process_pattern($2, seunshare_t)
- allow $2 seunshare_t:process signal;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `seunshare_role'($*)) dnl
- ')
-
-## Run .NET server and client applications on Linux.
-
-#######################################
-##
-## The role template for the mono module.
-##
-##
-##
-## This template creates a derived domains which are used
-## for mono applications.
-##
-##
-##
-##
-## The prefix of the user domain (e.g., user
-## is the prefix for user_t).
-##
-##
-##
-##
-## The role associated with the user domain.
-##
-##
-##
-##
-## The type of the user domain.
-##
-##
-#
- define(`mono_role_template',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mono_role_template'($*)) dnl
-
- gen_require(`
- attribute mono_domain;
- type mono_exec_t;
- ')
-
- ########################################
- #
- # Declarations
- #
-
- type $1_mono_t, mono_domain;
- domain_type($1_mono_t)
- domain_entry_file($1_mono_t, mono_exec_t)
- role $2 types $1_mono_t;
-
- domain_interactive_fd($1_mono_t)
- application_type($1_mono_t)
-
- ########################################
- #
- # Policy
- #
-
- domtrans_pattern($3, mono_exec_t, $1_mono_t)
-
- allow $3 $1_mono_t:process { ptrace noatsecure signal_perms };
- ps_process_pattern($2, $1_mono_t)
-
- corecmd_bin_domtrans($1_mono_t, $3)
-
- userdom_manage_user_tmpfs_files($1_mono_t)
-
- optional_policy(`
- fs_dontaudit_rw_tmpfs_files($1_mono_t)
-
- xserver_role($1_r, $1_mono_t)
- ')
- dnl
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mono_role_template'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute mono in the mono domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`mono_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mono_domtrans'($*)) dnl
-
- gen_require(`
- type mono_t, mono_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, mono_exec_t, mono_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mono_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute mono in the mono domain, and
-## allow the specified role the mono domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`mono_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mono_run'($*)) dnl
-
- gen_require(`
- attribute_role mono_roles;
- ')
-
- mono_domtrans($1)
- roleattribute $2 mono_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mono_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute mono in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`mono_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mono_exec'($*)) dnl
-
- gen_require(`
- type mono_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, mono_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mono_exec'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write mono shared memory.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`mono_rw_shm',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mono_rw_shm'($*)) dnl
-
- gen_require(`
- type mono_t;
- ')
-
- allow $1 mono_t:shm rw_shm_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mono_rw_shm'($*)) dnl
- ')
-
-## X Window Managers.
-
-#######################################
-##
-## The role template for the wm module.
-##
-##
-##
-## This template creates a derived domains which are used
-## for window manager applications.
-##
-##
-##
-##
-## The prefix of the user domain (e.g., user
-## is the prefix for user_t).
-##
-##
-##
-##
-## The role associated with the user domain.
-##
-##
-##
-##
-## The type of the user domain.
-##
-##
-#
- define(`wm_role_template',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `wm_role_template'($*)) dnl
-
- gen_require(`
- attribute wm_domain;
- type wm_exec_t;
- ')
-
- ########################################
- #
- # Declarations
- #
-
- type $1_wm_t, wm_domain;
- userdom_user_application_domain($1_wm_t, wm_exec_t)
- role $2 types $1_wm_t;
-
- ########################################
- #
- # Policy
- #
-
- allow $3 $1_wm_t:fd use;
-
- allow $1_wm_t $3:unix_stream_socket connectto;
- allow $3 $1_wm_t:unix_stream_socket connectto;
-
- allow $3 $1_wm_t:process { ptrace signal_perms };
- ps_process_pattern($3, $1_wm_t)
-
- allow $1_wm_t $3:process { signull sigkill };
-
- domtrans_pattern($3, wm_exec_t, $1_wm_t)
-
- corecmd_bin_domtrans($1_wm_t, $3)
- corecmd_shell_domtrans($1_wm_t, $3)
-
- mls_file_read_all_levels($1_wm_t)
- mls_file_write_all_levels($1_wm_t)
- mls_xwin_read_all_levels($1_wm_t)
- mls_xwin_write_all_levels($1_wm_t)
- mls_fd_use_all_levels($1_wm_t)
-
- auth_use_nsswitch($1_wm_t)
-
- xserver_role($2, $1_wm_t)
- xserver_manage_core_devices($1_wm_t)
-
- wm_write_pipes($1, $3)
-
- optional_policy(`
- dbus_connect_spec_session_bus($1, $1_wm_t)
- dbus_spec_session_bus_client($1, $1_wm_t)
- dbus_system_bus_client($1_wm_t)
-
- optional_policy(`
- wm_dbus_chat($1, $3)
- ')
- ')
-
- optional_policy(`
- gnome_stream_connect_all_gkeyringd($1_wm_t)
- ')
-
- optional_policy(`
- policykit_run_auth($1_wm_t, $2)
- policykit_signal_auth($1_wm_t)
- ')
-
- optional_policy(`
- pulseaudio_run($1_wm_t, $2)
- ')
- dnl
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `wm_role_template'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute wm in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`wm_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `wm_exec'($*)) dnl
-
- gen_require(`
- type wm_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, wm_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `wm_exec'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive messages from
-## specified wm over dbus.
-##
-##
-##
-## The prefix of the user domain (e.g., user
-## is the prefix for user_t).
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`wm_dbus_chat',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `wm_dbus_chat'($*)) dnl
-
- gen_require(`
- type $1_wm_t;
- class dbus send_msg;
- ')
-
- allow $2 $1_wm_t:dbus send_msg;
- allow $1_wm_t $2:dbus send_msg;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `wm_dbus_chat'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to execute
-## files in temporary directories.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`wm_dontaudit_exec_tmp_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `wm_dontaudit_exec_tmp_files'($*)) dnl
-
- gen_require(`
- type wm_tmp_t;
- ')
-
- dontaudit $1 wm_tmp_t:file exec_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `wm_dontaudit_exec_tmp_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to execute
-## files in temporary filesystems.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`wm_dontaudit_exec_tmpfs_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `wm_dontaudit_exec_tmpfs_files'($*)) dnl
-
- gen_require(`
- type wm_tmpfs_t;
- ')
-
- dontaudit $1 wm_tmpfs_t:file exec_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `wm_dontaudit_exec_tmpfs_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Create a domain for applications
-## that are launched by the window
-## manager.
-##
-##
-##
-## Create a domain for applications that are launched by the
-## window manager (implying a domain transition). Typically
-## these are graphical applications that are run interactively.
-##
-##
-## The types will be made usable as a domain and file, making
-## calls to domain_type() and files_type() redundant.
-##
-##
-##
-##
-## Type to be used in the domain transition as the application
-## domain.
-##
-##
-##
-##
-## Type of the program to be used as an entry point to this domain.
-##
-##
-##
-##
-## Type to be used as the source window manager domain.
-##
-##
-##
-#
- define(`wm_application_domain',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `wm_application_domain'($*)) dnl
-
- gen_require(`
- attribute wm_domain;
- ')
-
- userdom_user_application_domain($1, $2)
- domtrans_pattern(wm_domain, $2, $1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `wm_application_domain'($*)) dnl
- ')
-
-
-########################################
-##
-## Write wm unnamed pipes.
-##
-##
-##
-## The prefix of the user domain (e.g., user
-## is the prefix for user_t).
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`wm_write_pipes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `wm_write_pipes'($*)) dnl
-
- gen_require(`
- type $1_wm_t;
- ')
-
- allow $2 $1_wm_t:fifo_file write;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `wm_write_pipes'($*)) dnl
- ')
-
-## Chromium browser
-
-#######################################
-##
-## Role access for chromium
-##
-##
-##
-## Role allowed access
-##
-##
-##
-##
-## User domain for the role
-##
-##
-#
- define(`chromium_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `chromium_role'($*)) dnl
-
- gen_require(`
- type chromium_t;
- type chromium_renderer_t;
- type chromium_sandbox_t;
- type chromium_naclhelper_t;
- class dbus send_msg;
- ')
-
- role $1 types chromium_t;
- role $1 types chromium_renderer_t;
- role $1 types chromium_sandbox_t;
- role $1 types chromium_naclhelper_t;
-
- # Transition from the user domain to the derived domain
- chromium_domtrans($2)
-
- # Allow ps to show chromium processes and allow the user to signal it
- ps_process_pattern($2, chromium_t)
- ps_process_pattern($2, chromium_renderer_t)
-
- allow $2 chromium_t:process signal_perms;
- allow $2 chromium_renderer_t:process signal_perms;
- allow $2 chromium_naclhelper_t:process signal_perms;
-
- allow chromium_sandbox_t $2:fd use;
- allow chromium_naclhelper_t $2:fd use;
-
- allow $2 chromium_t:dbus send_msg;
- allow chromium_t $2:dbus send_msg;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `chromium_role'($*)) dnl
- ')
-
-
-#######################################
-##
-## Read-write access to Chromiums' temporary fifo files
-##
-##
-##
-## Domain allowed access
-##
-##
-#
- define(`chromium_rw_tmp_pipes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `chromium_rw_tmp_pipes'($*)) dnl
-
- gen_require(`
- type chromium_tmp_t;
- ')
-
- rw_fifo_files_pattern($1, chromium_tmp_t, chromium_tmp_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `chromium_rw_tmp_pipes'($*)) dnl
- ')
-
-
-##############################################
-##
-## Automatically use the specified type for resources created in chromium's
-## temporary locations
-##
-##
-##
-## Domain that creates the resource(s)
-##
-##
-##
-##
-## Type of the resource created
-##
-##
-##
-##
-## The name of the resource being created
-##
-##
-#
- define(`chromium_tmp_filetrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `chromium_tmp_filetrans'($*)) dnl
-
- gen_require(`
- type chromium_tmp_t;
- ')
-
- search_dirs_pattern($1, chromium_tmp_t, chromium_tmp_t)
- filetrans_pattern($1, chromium_tmp_t, $2, $3, $4)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `chromium_tmp_filetrans'($*)) dnl
- ')
-
-
-#######################################
-##
-## Execute a domain transition to the chromium domain (chromium_t)
-##
-##
-##
-## Domain allowed access
-##
-##
-#
- define(`chromium_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `chromium_domtrans'($*)) dnl
-
- gen_require(`
- type chromium_t;
- type chromium_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, chromium_exec_t, chromium_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `chromium_domtrans'($*)) dnl
- ')
-
-
-#######################################
-##
-## Execute chromium in the chromium domain and allow the specified role to access the chromium domain
-##
-##
-##
-## Domain allowed access
-##
-##
-##
-##
-## Role allowed access
-##
-##
-#
- define(`chromium_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `chromium_run'($*)) dnl
-
- gen_require(`
- type chromium_t;
- ')
-
- chromium_domtrans($1)
- role $2 types chromium_t;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `chromium_run'($*)) dnl
- ')
-
-## User network interface configuration helper.
-
-########################################
-##
-## Execute usernetctl in the usernetctl domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`usernetctl_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `usernetctl_domtrans'($*)) dnl
-
- gen_require(`
- type usernetctl_t, usernetctl_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, usernetctl_exec_t, usernetctl_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `usernetctl_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute usernetctl in the usernetctl
-## domain, and allow the specified role
-## the usernetctl domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`usernetctl_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `usernetctl_run'($*)) dnl
-
- gen_require(`
- attribute_role usernetctl_roles;
- ')
-
- usernetctl_domtrans($1)
- roleattribute $2 usernetctl_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `usernetctl_run'($*)) dnl
- ')
-
-## Thunderbird email client.
-
-########################################
-##
-## Role access for thunderbird.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`thunderbird_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `thunderbird_role'($*)) dnl
-
- gen_require(`
- attribute_role thunderbird_roles;
- type thunderbird_t, thunderbird_exec_t, thunderbird_home_t;
- type thunderbird_tmpfs_t;
- ')
-
- roleattribute $1 thunderbird_roles;
-
- domtrans_pattern($2, thunderbird_exec_t, thunderbird_t)
-
- stream_connect_pattern($2, thunderbird_tmpfs_t, thunderbird_tmpfs_t, thunderbird_t)
-
- allow thunderbird_t $2:unix_stream_socket connectto;
-
- allow $2 thunderbird_t:process { ptrace signal_perms };
- ps_process_pattern($2, thunderbird_t)
-
- allow $2 thunderbird_home_t:dir { manage_dir_perms relabel_dir_perms };
- allow $2 thunderbird_home_t:file { manage_file_perms relabel_file_perms };
- allow $2 thunderbird_home_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
- userdom_user_home_dir_filetrans($2, thunderbird_home_t, dir, ".thunderbird")
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `thunderbird_role'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute thunderbird in the thunderbird domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`thunderbird_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `thunderbird_domtrans'($*)) dnl
-
- gen_require(`
- type thunderbird_t, thunderbird_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, thunderbird_exec_t, thunderbird_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `thunderbird_domtrans'($*)) dnl
- ')
-
-## Pulseaudio network sound server.
-
-########################################
-##
-## Role access for pulseaudio.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`pulseaudio_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `pulseaudio_role'($*)) dnl
-
- gen_require(`
- attribute pulseaudio_tmpfsfile;
- type pulseaudio_t, pulseaudio_home_t, pulseaudio_tmpfs_t;
- type pulseaudio_tmp_t;
- ')
-
- pulseaudio_run($2, $1)
-
- allow $2 pulseaudio_t:process { ptrace signal_perms };
- allow $2 pulseaudio_t:fd use;
- ps_process_pattern($2, pulseaudio_t)
-
- allow $2 pulseaudio_home_t:dir { manage_dir_perms relabel_dir_perms };
- allow $2 pulseaudio_home_t:file { manage_file_perms relabel_file_perms };
- allow $2 pulseaudio_home_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
-
- allow $2 { pulseaudio_tmpfs_t pulseaudio_tmpfsfile }:dir { manage_dir_perms relabel_dir_perms };
- allow $2 { pulseaudio_tmpfs_t pulseaudio_tmpfsfile }:file { manage_file_perms relabel_file_perms map };
-
- allow $2 pulseaudio_tmp_t:dir { manage_dir_perms relabel_dir_perms };
- allow $2 pulseaudio_tmp_t:file { manage_file_perms relabel_file_perms };
- allow $2 pulseaudio_tmp_t:sock_file { manage_sock_file_perms relabel_sock_file_perms };
-
- allow pulseaudio_t $2:unix_stream_socket connectto;
- allow pulseaudio_t $2:process signull;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `pulseaudio_role'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute a domain transition to run pulseaudio.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`pulseaudio_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `pulseaudio_domtrans'($*)) dnl
-
- gen_require(`
- attribute pulseaudio_client;
- type pulseaudio_t, pulseaudio_exec_t;
- ')
-
- typeattribute $1 pulseaudio_client;
-
- corecmd_search_bin($1)
- domtrans_pattern($1, pulseaudio_exec_t, pulseaudio_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `pulseaudio_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute pulseaudio in the pulseaudio
-## domain, and allow the specified role
-## the pulseaudio domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`pulseaudio_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `pulseaudio_run'($*)) dnl
-
- gen_require(`
- attribute_role pulseaudio_roles;
- ')
-
- pulseaudio_domtrans($1)
- roleattribute $2 pulseaudio_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `pulseaudio_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute pulseaudio in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`pulseaudio_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `pulseaudio_exec'($*)) dnl
-
- gen_require(`
- type pulseaudio_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, pulseaudio_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `pulseaudio_exec'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to execute pulseaudio.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`pulseaudio_dontaudit_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `pulseaudio_dontaudit_exec'($*)) dnl
-
- gen_require(`
- type pulseaudio_exec_t;
- ')
-
- dontaudit $1 pulseaudio_exec_t:file exec_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `pulseaudio_dontaudit_exec'($*)) dnl
- ')
-
-
-########################################
-##
-## Send null signals to pulseaudio.
-## processes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`pulseaudio_signull',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `pulseaudio_signull'($*)) dnl
-
- gen_require(`
- type pulseaudio_t;
- ')
-
- allow $1 pulseaudio_t:process signull;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `pulseaudio_signull'($*)) dnl
- ')
-
-
-########################################
-##
-## Use file descriptors for
-## pulseaudio.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`pulseaudio_use_fds',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `pulseaudio_use_fds'($*)) dnl
-
- gen_require(`
- type pulseaudio_t;
- ')
-
- allow $1 pulseaudio_t:fd use;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `pulseaudio_use_fds'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to use the
-## file descriptors for pulseaudio.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`pulseaudio_dontaudit_use_fds',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `pulseaudio_dontaudit_use_fds'($*)) dnl
-
- gen_require(`
- type pulseaudio_t;
- ')
-
- dontaudit $1 pulseaudio_t:fd use;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `pulseaudio_dontaudit_use_fds'($*)) dnl
- ')
-
-
-#####################################
-##
-## Connect to pulseaudio with a unix
-## domain stream socket.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`pulseaudio_stream_connect',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `pulseaudio_stream_connect'($*)) dnl
-
- gen_require(`
- type pulseaudio_t, pulseaudio_runtime_t, pulseaudio_tmp_t;
- ')
-
- files_search_pids($1)
- stream_connect_pattern($1, { pulseaudio_tmp_t pulseaudio_runtime_t }, { pulseaudio_tmp_t pulseaudio_runtime_t }, pulseaudio_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `pulseaudio_stream_connect'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive messages from
-## pulseaudio over dbus.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`pulseaudio_dbus_chat',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `pulseaudio_dbus_chat'($*)) dnl
-
- gen_require(`
- type pulseaudio_t;
- class dbus send_msg;
- ')
-
- allow $1 pulseaudio_t:dbus send_msg;
- allow pulseaudio_t $1:dbus send_msg;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `pulseaudio_dbus_chat'($*)) dnl
- ')
-
-
-########################################
-##
-## Set attributes of pulseaudio home directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`pulseaudio_setattr_home_dir',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `pulseaudio_setattr_home_dir'($*)) dnl
-
- gen_require(`
- type pulseaudio_home_t;
- ')
-
- allow $1 pulseaudio_home_t:dir setattr_dir_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `pulseaudio_setattr_home_dir'($*)) dnl
- ')
-
-
-########################################
-##
-## Read pulseaudio home content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`pulseaudio_read_home',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `pulseaudio_read_home'($*)) dnl
-
- gen_require(`
- type pulseaudio_home_t;
- ')
-
- userdom_search_user_home_dirs($1)
- allow $1 pulseaudio_home_t:dir list_dir_perms;
- allow $1 pulseaudio_home_t:file read_file_perms;
- allow $1 pulseaudio_home_t:lnk_file read_lnk_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `pulseaudio_read_home'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write Pulse Audio files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`pulseaudio_rw_home_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `pulseaudio_rw_home_files'($*)) dnl
-
- gen_require(`
- type pulseaudio_home_t;
- ')
-
- userdom_search_user_home_dirs($1)
- rw_files_pattern($1, pulseaudio_home_t, pulseaudio_home_t)
- read_lnk_files_pattern($1, pulseaudio_home_t, pulseaudio_home_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `pulseaudio_rw_home_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## pulseaudio home content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`pulseaudio_manage_home',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `pulseaudio_manage_home'($*)) dnl
-
- gen_require(`
- type pulseaudio_home_t;
- ')
-
- userdom_search_user_home_dirs($1)
- allow $1 pulseaudio_home_t:dir manage_dir_perms;
- allow $1 pulseaudio_home_t:file manage_file_perms;
- allow $1 pulseaudio_home_t:lnk_file manage_lnk_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `pulseaudio_manage_home'($*)) dnl
- ')
-
-
-########################################
-##
-## Create objects in user home
-## directories with the pulseaudio
-## home type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Class of the object being created.
-##
-##
-##
-##
-## The name of the object being created.
-##
-##
-#
- define(`pulseaudio_home_filetrans_pulseaudio_home',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `pulseaudio_home_filetrans_pulseaudio_home'($*)) dnl
-
- gen_require(`
- type pulseaudio_home_t;
- ')
-
- userdom_user_home_dir_filetrans($1, pulseaudio_home_t, $2, $3)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `pulseaudio_home_filetrans_pulseaudio_home'($*)) dnl
- ')
-
-
-########################################
-##
-## Make the specified tmpfs file type
-## pulseaudio tmpfs content.
-##
-##
-##
-## File type to make pulseaudio tmpfs content.
-##
-##
-#
- define(`pulseaudio_tmpfs_content',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `pulseaudio_tmpfs_content'($*)) dnl
-
- gen_require(`
- attribute pulseaudio_tmpfsfile;
- ')
-
- typeattribute $1 pulseaudio_tmpfsfile;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `pulseaudio_tmpfs_content'($*)) dnl
- ')
-
-
-#######################################
-##
-## Read pulseaudio tmpfs files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`pulseaudio_read_tmpfs_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `pulseaudio_read_tmpfs_files'($*)) dnl
-
- gen_require(`
- type pulseaudio_tmpfs_t;
- ')
-
- fs_search_tmpfs($1)
- read_files_pattern($1, pulseaudio_tmpfs_t, pulseaudio_tmpfs_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `pulseaudio_read_tmpfs_files'($*)) dnl
- ')
-
-
-#######################################
-##
-## Read and write pulseaudio tmpfs
-## files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`pulseaudio_rw_tmpfs_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `pulseaudio_rw_tmpfs_files'($*)) dnl
-
- gen_require(`
- type pulseaudio_tmpfs_t;
- ')
-
- fs_search_tmpfs($1)
- rw_files_pattern($1, pulseaudio_tmpfs_t, pulseaudio_tmpfs_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `pulseaudio_rw_tmpfs_files'($*)) dnl
- ')
-
-
-# Below are Gentoo specifics but ifdef distro_gentoo cannot be used in interfaces
-
-########################################
-##
-## Mark the specified domain as a PulseAudio client domain
-## and the related tmpfs file type as a (shared) PulseAudio tmpfs
-## file type used for the shared memory access
-##
-##
-##
-## Domain to become a PulseAudio client domain
-##
-##
-##
-##
-## Tmpfs type used for shared memory of the given domain
-##
-##
-#
- define(`pulseaudio_client_domain',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `pulseaudio_client_domain'($*)) dnl
-
- refpolicywarn(`$0($*) has been deprecated')
-
- pulseaudio_domtrans($1)
- pulseaudio_tmpfs_content($2)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `pulseaudio_client_domain'($*)) dnl
- ')
-
-## Mplayer media player and encoder.
-
-########################################
-##
-## Role access for mplayer
-##
-##
-##
-## Role allowed access
-##
-##
-##
-##
-## User domain for the role
-##
-##
-#
- define(`mplayer_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mplayer_role'($*)) dnl
-
- gen_require(`
- attribute_role mencoder_roles, mplayer_roles;
- type mencoder_t, mencoder_exec_t, mplayer_home_t;
- type mplayer_t, mplayer_exec_t, mplayer_tmpfs_t;
- ')
-
- ########################################
- #
- # Declarations
- #
-
- roleattribute $1 mencoder_roles;
- roleattribute $1 mplayer_roles;
-
- ########################################
- #
- # Policy
- #
-
- domtrans_pattern($2, mencoder_exec_t, mencoder_t)
- domtrans_pattern($2, mplayer_exec_t, mplayer_t)
-
- allow $2 { mplayer_t mencoder_t }:process { ptrace signal_perms };
- ps_process_pattern($2, { mplayer_t mencoder_t })
-
- allow $2 mplayer_home_t:dir { manage_dir_perms relabel_dir_perms };
- allow $2 mplayer_home_t:file { manage_file_perms relabel_file_perms };
- allow $2 mplayer_home_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
- userdom_user_home_dir_filetrans($2, mplayer_home_t, dir, ".mplayer")
-
- allow $2 mplayer_tmpfs_t:file { manage_file_perms relabel_file_perms };
- allow $2 mplayer_tmpfs_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
- allow $2 mplayer_tmpfs_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
- allow $2 mplayer_tmpfs_t:sock_file { manage_sock_file_perms relabel_sock_file_perms };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mplayer_role'($*)) dnl
- ')
-
-
-########################################
-##
-## Run mplayer in mplayer domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`mplayer_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mplayer_domtrans'($*)) dnl
-
- gen_require(`
- type mplayer_t, mplayer_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, mplayer_exec_t, mplayer_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mplayer_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute mplayer in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
-#
- define(`mplayer_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mplayer_exec'($*)) dnl
-
- gen_require(`
- type mplayer_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, mplayer_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mplayer_exec'($*)) dnl
- ')
-
-
-########################################
-##
-## Read mplayer user home content files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`mplayer_read_user_home_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mplayer_read_user_home_files'($*)) dnl
-
- gen_require(`
- type mplayer_home_t;
- ')
-
- userdom_search_user_home_dirs($1)
- read_files_pattern($1, mplayer_home_t, mplayer_home_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mplayer_read_user_home_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## generic mplayer home content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`mplayer_manage_generic_home_content',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mplayer_manage_generic_home_content'($*)) dnl
-
- gen_require(`
- type mplayer_home_t;
- ')
-
- userdom_search_user_home_dirs($1)
- allow $1 mplayer_home_t:dir manage_dir_perms;
- allow $1 mplayer_home_t:file manage_file_perms;
- allow $1 mplayer_home_t:lnk_file manage_lnk_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mplayer_manage_generic_home_content'($*)) dnl
- ')
-
-
-########################################
-##
-## Create specified objects in user home
-## directories with the generic mplayer
-## home type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Class of the object being created.
-##
-##
-##
-##
-## The name of the object being created.
-##
-##
-#
- define(`mplayer_home_filetrans_mplayer_home',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mplayer_home_filetrans_mplayer_home'($*)) dnl
-
- gen_require(`
- type mplayer_home_t;
- ')
-
- userdom_user_home_dir_filetrans($1, mplayer_home_t, $2, $3)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mplayer_home_filetrans_mplayer_home'($*)) dnl
- ')
-
-## Lock one or more sessions on the Linux console.
-
-#######################################
-##
-## Execute vlock in the vlock domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`vlock_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `vlock_domtrans'($*)) dnl
-
- gen_require(`
- type vlock_t, vlock_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, vlock_exec_t, vlock_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `vlock_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute vlock in the vlock domain,
-## and allow the specified role
-## the vlock domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed to access.
-##
-##
-##
-#
- define(`vlock_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `vlock_run'($*)) dnl
-
- gen_require(`
- attribute_role vlock_roles;
- ')
-
- vlock_domtrans($1)
- roleattribute $2 vlock_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `vlock_run'($*)) dnl
- ')
-
-## User mode linux tools and services.
-
-########################################
-##
-## Role access for uml.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`uml_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `uml_role'($*)) dnl
-
- gen_require(`
- attribute_role uml_roles;
- type uml_t, uml_exec_t;
- type uml_ro_t, uml_rw_t, uml_tmp_t;
- type uml_tmpfs_t;
- ')
-
- roleattribute $1 uml_roles;
-
- domtrans_pattern($2, uml_exec_t, uml_t)
-
- dgram_send_pattern($2, uml_tmpfs_t, uml_tmpfs_t, uml_t)
-
- allow uml_t $2:unix_dgram_socket sendto;
-
- ps_process_pattern($2, uml_t)
- allow $2 uml_t:process { ptrace signal_perms };
-
- allow $2 { uml_ro_t uml_rw_t uml_tmp_t uml_exec_t }:dir { manage_dir_perms relabel_dir_perms };
- allow $2 { uml_ro_t uml_rw_t uml_tmp_t uml_tmpfs_t uml_exec_t }:file { manage_file_perms relabel_file_perms };
- allow $2 { uml_ro_t uml_rw_t uml_tmpfs_t }:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
- allow $2 { uml_ro_t uml_rw_t uml_tmpfs_t }:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
- allow $2 { uml_ro_t uml_rw_t uml_tmpfs_t }:sock_file { manage_sock_file_perms relabel_sock_file_perms };
- userdom_user_home_dir_filetrans($2, uml_rw_t, dir, ".uml")
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `uml_role'($*)) dnl
- ')
-
-
-########################################
-##
-## Set attributes of uml pid sock files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`uml_setattr_util_sockets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `uml_setattr_util_sockets'($*)) dnl
-
- gen_require(`
- type uml_switch_runtime_t;
- ')
-
- allow $1 uml_switch_runtime_t:sock_file setattr_sock_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `uml_setattr_util_sockets'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## uml pid files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`uml_manage_util_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `uml_manage_util_files'($*)) dnl
-
- gen_require(`
- type uml_switch_runtime_t;
- ')
-
- manage_files_pattern($1, uml_switch_runtime_t, uml_switch_runtime_t)
- manage_lnk_files_pattern($1, uml_switch_runtime_t, uml_switch_runtime_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `uml_manage_util_files'($*)) dnl
- ')
-
-## Yum/Apt Mirroring.
-
-########################################
-##
-## Execute yam in the yam domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`yam_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `yam_domtrans'($*)) dnl
-
- gen_require(`
- type yam_t, yam_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, yam_exec_t, yam_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `yam_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute yam in the yam domain, and
-## allow the specified role the yam domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`yam_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `yam_run'($*)) dnl
-
- gen_require(`
- attribute_role yam_roles;
- ')
-
- yam_domtrans($1)
- roleattribute $2 yam_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `yam_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Read yam content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`yam_read_content',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `yam_read_content'($*)) dnl
-
- gen_require(`
- type yam_content_t;
- ')
-
- allow $1 yam_content_t:dir list_dir_perms;
- read_files_pattern($1, yam_content_t, yam_content_t)
- read_lnk_files_pattern($1, yam_content_t, yam_content_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `yam_read_content'($*)) dnl
- ')
-
-## libmtp: An Initiatior implementation of the Media Transfer Protocol (MTP).
-
-###########################################################
-##
-## Role access for libmtp.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`libmtp_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `libmtp_role'($*)) dnl
-
- gen_require(`
- attribute_role libmtp_roles;
- type libmtp_t, libmtp_exec_t;
- ')
-
- roleattribute $1 libmtp_roles;
-
- domtrans_pattern($2, libmtp_exec_t, libmtp_t)
-
- allow $2 libmtp_t:process { ptrace signal_perms };
- ps_process_pattern($2, libmtp_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `libmtp_role'($*)) dnl
- ')
-
-## A Unix manpage-to-HTML converter.
-## Library for locking devices.
-
-########################################
-##
-## Role access for lockdev.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`lockdev_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `lockdev_role'($*)) dnl
-
- gen_require(`
- attribute_role lockdev_roles;
- type lockdev_t, lockdev_exec_t;
- ')
-
- ########################################
- #
- # Declarations
- #
-
- roleattribute $1 lockdev_roles;
-
- ########################################
- #
- # Policy
- #
-
- domtrans_pattern($2, lockdev_exec_t, lockdev_t)
-
- allow $2 lockdev_t:process { ptrace signal_perms };
- ps_process_pattern($2, lockdev_t)
-
- allow lockdev_t $2:process signull;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `lockdev_role'($*)) dnl
- ')
-
-## Policy for GNU Privacy Guard and related programs.
-
-############################################################
-##
-## Role access for gpg.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`gpg_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gpg_role'($*)) dnl
-
- gen_require(`
- attribute_role gpg_roles, gpg_agent_roles, gpg_helper_roles, gpg_pinentry_roles;
- type gpg_t, gpg_exec_t, gpg_agent_t;
- type gpg_agent_exec_t, gpg_agent_tmp_t, gpg_helper_t;
- type gpg_pinentry_t, gpg_pinentry_tmp_t, gpg_secret_t;
- ')
-
- roleattribute $1 gpg_roles;
- roleattribute $1 gpg_agent_roles;
- roleattribute $1 gpg_helper_roles;
- roleattribute $1 gpg_pinentry_roles;
-
- domtrans_pattern($2, gpg_exec_t, gpg_t)
- domtrans_pattern($2, gpg_agent_exec_t, gpg_agent_t)
-
- allow $2 self:process setrlimit;
- allow $2 { gpg_t gpg_agent_t gpg_helper_t gpg_pinentry_t }:process { ptrace signal_perms };
- ps_process_pattern($2, { gpg_t gpg_agent_t gpg_helper_t gpg_pinentry_t })
-
- allow gpg_pinentry_t $2:process signull;
- allow gpg_helper_t $2:fd use;
- allow { gpg_t gpg_agent_t gpg_helper_t gpg_pinentry_t } $2:fifo_file { read write };
-
- allow $2 { gpg_agent_tmp_t gpg_secret_t }:dir { manage_dir_perms relabel_dir_perms };
- allow $2 { gpg_agent_tmp_t gpg_secret_t }:file { manage_file_perms relabel_file_perms };
- allow $2 gpg_secret_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
- allow $2 { gpg_agent_tmp_t gpg_pinentry_tmp_t gpg_secret_t }:sock_file { manage_sock_file_perms relabel_sock_file_perms };
- filetrans_pattern($2, gpg_secret_t, gpg_agent_tmp_t, sock_file, "log-socket")
- userdom_user_home_dir_filetrans($2, gpg_secret_t, dir, ".gnupg")
-
- optional_policy(`
- gpg_pinentry_dbus_chat($2)
- ')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gpg_role'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute the gpg in the gpg domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`gpg_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gpg_domtrans'($*)) dnl
-
- gen_require(`
- type gpg_t, gpg_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, gpg_exec_t, gpg_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gpg_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute the gpg in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gpg_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gpg_exec'($*)) dnl
-
- gen_require(`
- type gpg_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, gpg_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gpg_exec'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute gpg in a specified domain.
-##
-##
-##
-## Execute gpg in a specified domain.
-##
-##
-## No interprocess communication (signals, pipes,
-## etc.) is provided by this interface since
-## the domains are not owned by this module.
-##
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Domain to transition to.
-##
-##
-#
- define(`gpg_spec_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gpg_spec_domtrans'($*)) dnl
-
- gen_require(`
- type gpg_exec_t;
- ')
-
- corecmd_search_bin($1)
- domain_auto_transition_pattern($1, gpg_exec_t, $2)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gpg_spec_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute the gpg-agent in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gpg_exec_agent',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gpg_exec_agent'($*)) dnl
-
- gen_require(`
- type gpg_agent_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, gpg_agent_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gpg_exec_agent'($*)) dnl
- ')
-
-
-######################################
-##
-## Make gpg executable files an
-## entrypoint for the specified domain.
-##
-##
-##
-## The domain for which gpg_exec_t is an entrypoint.
-##
-##
-#
- define(`gpg_entry_type',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gpg_entry_type'($*)) dnl
-
- gen_require(`
- type gpg_exec_t;
- ')
-
- domain_entry_file($1, gpg_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gpg_entry_type'($*)) dnl
- ')
-
-
-########################################
-##
-## Send generic signals to gpg.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gpg_signal',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gpg_signal'($*)) dnl
-
- gen_require(`
- type gpg_t;
- ')
-
- allow $1 gpg_t:process signal;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gpg_signal'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write gpg agent pipes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gpg_rw_agent_pipes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gpg_rw_agent_pipes'($*)) dnl
-
- gen_require(`
- type gpg_agent_t;
- ')
-
- allow $1 gpg_agent_t:fifo_file rw_fifo_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gpg_rw_agent_pipes'($*)) dnl
- ')
-
-
-########################################
-##
-## Connect to gpg agent socket
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gpg_stream_connect_agent',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gpg_stream_connect_agent'($*)) dnl
-
- gen_require(`
- type gpg_agent_t, gpg_agent_tmp_t;
- type gpg_secret_t, gpg_runtime_t;
- ')
-
- stream_connect_pattern($1, gpg_agent_tmp_t, gpg_agent_tmp_t, gpg_agent_t)
- allow $1 { gpg_secret_t gpg_runtime_t }:dir search_dir_perms;
- userdom_search_user_runtime($1)
- userdom_search_user_home_dirs($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gpg_stream_connect_agent'($*)) dnl
- ')
-
-
-########################################
-##
-## Search gpg agent dirs.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gpg_search_agent_tmp_dirs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gpg_search_agent_tmp_dirs'($*)) dnl
-
- gen_require(`
- type gpg_agent_tmp_t;
- ')
-
- allow $1 gpg_agent_tmp_t:dir search_dir_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gpg_search_agent_tmp_dirs'($*)) dnl
- ')
-
-
-########################################
-##
-## filetrans in gpg_agent_tmp_t dirs
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gpg_agent_tmp_filetrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gpg_agent_tmp_filetrans'($*)) dnl
-
- gen_require(`
- type gpg_agent_tmp_t;
- ')
-
- filetrans_pattern($1, gpg_agent_tmp_t, $2, $3, $4)
- userdom_search_user_runtime($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gpg_agent_tmp_filetrans'($*)) dnl
- ')
-
-
-########################################
-##
-## filetrans in gpg_runtime_t dirs
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gpg_runtime_filetrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gpg_runtime_filetrans'($*)) dnl
-
- gen_require(`
- type gpg_runtime_t;
- ')
-
- filetrans_pattern($1, gpg_runtime_t, $2, $3, $4)
- userdom_search_user_runtime($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gpg_runtime_filetrans'($*)) dnl
- ')
-
-
-########################################
-##
-## filetrans in gpg_secret_t dirs
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gpg_secret_filetrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gpg_secret_filetrans'($*)) dnl
-
- gen_require(`
- type gpg_secret_t;
- ')
-
- filetrans_pattern($1, gpg_secret_t, $2, $3, $4)
- allow $1 gpg_secret_t:dir search_dir_perms;
- userdom_search_user_home_dirs($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gpg_secret_filetrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Send messages to and from gpg
-## pinentry over DBUS.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gpg_pinentry_dbus_chat',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gpg_pinentry_dbus_chat'($*)) dnl
-
- gen_require(`
- type gpg_pinentry_t;
- class dbus send_msg;
- ')
-
- allow $1 gpg_pinentry_t:dbus send_msg;
- allow gpg_pinentry_t $1:dbus send_msg;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gpg_pinentry_dbus_chat'($*)) dnl
- ')
-
-
-########################################
-##
-## List gpg user secrets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`gpg_list_user_secrets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gpg_list_user_secrets'($*)) dnl
-
- gen_require(`
- type gpg_secret_t;
- ')
-
- list_dirs_pattern($1, gpg_secret_t, gpg_secret_t)
- userdom_search_user_home_dirs($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gpg_list_user_secrets'($*)) dnl
- ')
-
-## helper function for grantpt(3), changes ownship and permissions of pseudotty.
-
-########################################
-##
-## Execute a domain transition to run ptchown.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`ptchown_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `ptchown_domtrans'($*)) dnl
-
- gen_require(`
- type ptchown_t, ptchown_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, ptchown_exec_t, ptchown_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `ptchown_domtrans'($*)) dnl
- ')
-
-
-#######################################
-##
-## Execute ptchown in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`ptchown_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `ptchown_exec'($*)) dnl
-
- gen_require(`
- type ptchown_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, ptchown_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `ptchown_exec'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute ptchown in the ptchown
-## domain, and allow the specified
-## role the ptchown domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`ptchown_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `ptchown_run'($*)) dnl
-
- gen_require(`
- attribute_role ptchown_roles;
- ')
-
- ptchown_domtrans($1)
- roleattribute $2 ptchown_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `ptchown_run'($*)) dnl
- ')
-
-## QEMU machine emulator and virtualizer.
-
-#######################################
-##
-## The template to define a qemu domain.
-##
-##
-##
-## Domain prefix to be used.
-##
-##
-#
- define(`qemu_domain_template',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `qemu_domain_template'($*)) dnl
-
- ##############################
- #
- # Declarations
- #
-
- type $1_t;
- domain_type($1_t)
-
- type $1_tmp_t;
- files_tmp_file($1_tmp_t)
-
- ##############################
- #
- # Policy
- #
-
- allow $1_t self:capability { dac_override dac_read_search };
- allow $1_t self:process { execstack execmem signal getsched };
- allow $1_t self:fifo_file rw_file_perms;
- allow $1_t self:shm create_shm_perms;
- allow $1_t self:unix_stream_socket create_stream_socket_perms;
- allow $1_t self:tcp_socket create_stream_socket_perms;
- allow $1_t self:tun_socket create;
-
- manage_dirs_pattern($1_t, $1_tmp_t, $1_tmp_t)
- manage_files_pattern($1_t, $1_tmp_t, $1_tmp_t)
- files_tmp_filetrans($1_t, $1_tmp_t, { file dir })
-
- kernel_read_system_state($1_t)
-
- corenet_all_recvfrom_unlabeled($1_t)
- corenet_all_recvfrom_netlabel($1_t)
- corenet_tcp_sendrecv_generic_if($1_t)
- corenet_tcp_sendrecv_generic_node($1_t)
- corenet_tcp_bind_generic_node($1_t)
- corenet_tcp_bind_vnc_port($1_t)
- corenet_rw_tun_tap_dev($1_t)
-
-# dev_rw_kvm($1_t)
-
- domain_use_interactive_fds($1_t)
-
- files_read_etc_files($1_t)
- files_read_usr_files($1_t)
- files_read_var_files($1_t)
- files_search_all($1_t)
-
- fs_list_inotifyfs($1_t)
- fs_rw_anon_inodefs_files($1_t)
- fs_rw_tmpfs_files($1_t)
-
- storage_raw_write_removable_device($1_t)
- storage_raw_read_removable_device($1_t)
-
- term_use_ptmx($1_t)
- term_getattr_pty_fs($1_t)
- term_use_generic_ptys($1_t)
-
- miscfiles_read_localization($1_t)
-
- sysnet_read_config($1_t)
-
- userdom_use_user_terminals($1_t)
- userdom_attach_admin_tun_iface($1_t)
-
- optional_policy(`
- samba_domtrans_smbd($1_t)
- ')
-
- optional_policy(`
- virt_manage_images($1_t)
- virt_read_config($1_t)
- virt_read_lib_files($1_t)
- virt_attach_tun_iface($1_t)
- ')
-
- optional_policy(`
- xserver_stream_connect($1_t)
- xserver_read_xdm_tmp_files($1_t)
- xserver_read_xdm_pid($1_t)
-# xserver_xdm_rw_shm($1_t)
- ')
- dnl
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `qemu_domain_template'($*)) dnl
- ')
-
-
-########################################
-##
-## Role access for qemu.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`qemu_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `qemu_role'($*)) dnl
-
- gen_require(`
- type qemu_t;
- ')
-
- qemu_run($2, $1)
-
- allow $2 qemu_t:process { ptrace signal_perms };
- ps_process_pattern($2, qemu_t)
- dnl
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `qemu_role'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute a domain transition to run qemu.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`qemu_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `qemu_domtrans'($*)) dnl
-
- gen_require(`
- type qemu_t, qemu_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, qemu_exec_t, qemu_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `qemu_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute a qemu in the caller domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`qemu_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `qemu_exec'($*)) dnl
-
- gen_require(`
- type qemu_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, qemu_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `qemu_exec'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute qemu in the qemu domain,
-## and allow the specified role the
-## qemu domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`qemu_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `qemu_run'($*)) dnl
-
- gen_require(`
- attribute_role qemu_roles;
- ')
-
- qemu_domtrans($1)
- roleattribute $2 qemu_roles;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `qemu_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Read qemu process state files.
-##
-##
-##
-## Domain to allow access.
-##
-##
-#
- define(`qemu_read_state',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `qemu_read_state'($*)) dnl
-
- gen_require(`
- type qemu_t;
- ')
-
- kernel_search_proc($1)
- allow $1 qemu_t:dir list_dir_perms;
- allow $1 qemu_t:file read_file_perms;
- allow $1 qemu_t:lnk_file read_lnk_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `qemu_read_state'($*)) dnl
- ')
-
-
-########################################
-##
-## Set qemu scheduler.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`qemu_setsched',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `qemu_setsched'($*)) dnl
-
- gen_require(`
- type qemu_t;
- ')
-
- allow $1 qemu_t:process setsched;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `qemu_setsched'($*)) dnl
- ')
-
-
-########################################
-##
-## Send generic signals to qemu.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`qemu_signal',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `qemu_signal'($*)) dnl
-
- gen_require(`
- type qemu_t;
- ')
-
- allow $1 qemu_t:process signal;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `qemu_signal'($*)) dnl
- ')
-
-
-########################################
-##
-## Send kill signals to qemu.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`qemu_kill',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `qemu_kill'($*)) dnl
-
- gen_require(`
- type qemu_t;
- ')
-
- allow $1 qemu_t:process sigkill;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `qemu_kill'($*)) dnl
- ')
-
-
-########################################
-##
-## Connect to qemu with a unix
-## domain stream socket.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`qemu_stream_connect',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `qemu_stream_connect'($*)) dnl
-
- gen_require(`
- type qemu_t, qemu_runtime_t;
- ')
-
- files_search_pids($1)
- stream_connect_pattern($1, qemu_runtime_t, qemu_runtime_t, qemu_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `qemu_stream_connect'($*)) dnl
- ')
-
-
-########################################
-##
-## Unlink qemu socket
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`qemu_delete_pid_sock_file',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `qemu_delete_pid_sock_file'($*)) dnl
-
- gen_require(`
- type qemu_runtime_t;
- ')
-
- allow $1 qemu_runtime_t:sock_file unlink;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `qemu_delete_pid_sock_file'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute a domain transition to
-## run qemu unconfined.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`qemu_domtrans_unconfined',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `qemu_domtrans_unconfined'($*)) dnl
-
- gen_require(`
- type unconfined_qemu_t, qemu_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, qemu_exec_t, unconfined_qemu_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `qemu_domtrans_unconfined'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## qemu temporary directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`qemu_manage_tmp_dirs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `qemu_manage_tmp_dirs'($*)) dnl
-
- gen_require(`
- type qemu_tmp_t;
- ')
-
- files_search_tmp($1)
- manage_dirs_pattern($1, qemu_tmp_t, qemu_tmp_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `qemu_manage_tmp_dirs'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete
-## qemu temporary files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`qemu_manage_tmp_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `qemu_manage_tmp_files'($*)) dnl
-
- gen_require(`
- type qemu_tmp_t;
- ')
-
- files_search_tmp($1)
- manage_files_pattern($1, qemu_tmp_t, qemu_tmp_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `qemu_manage_tmp_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute qemu in a specified domain.
-##
-##
-##
-## Execute qemu in a specified domain.
-##
-##
-## No interprocess communication (signals, pipes,
-## etc.) is provided by this interface since
-## the domains are not owned by this module.
-##
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Domain to transition to.
-##
-##
-#
- define(`qemu_spec_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `qemu_spec_domtrans'($*)) dnl
-
- gen_require(`
- type qemu_exec_t;
- ')
-
- corecmd_search_bin($1)
- domain_auto_transition_pattern($1, qemu_exec_t, $2)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `qemu_spec_domtrans'($*)) dnl
- ')
-
-
-######################################
-##
-## Make qemu executable files an
-## entrypoint for the specified domain.
-##
-##
-##
-## The domain for which qemu_exec_t is an entrypoint.
-##
-##
-#
- define(`qemu_entry_type',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `qemu_entry_type'($*)) dnl
-
- gen_require(`
- type qemu_exec_t;
- ')
-
- domain_entry_file($1, qemu_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `qemu_entry_type'($*)) dnl
- ')
-
-
-# Gentoo specific but cannot use ifdef distro_gentoo here
-
-#######################################
-##
-## Read/write to qemu socket files in /var/run
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`qemu_rw_pid_sock_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `qemu_rw_pid_sock_files'($*)) dnl
-
- gen_require(`
- type qemu_runtime_t;
- ')
-
- allow $1 qemu_runtime_t:sock_file rw_sock_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `qemu_rw_pid_sock_files'($*)) dnl
- ')
-
-## Wireshark packet capture tool.
-
-############################################################
-##
-## Role access for wireshark.
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-##
-## User domain for the role.
-##
-##
-#
- define(`wireshark_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `wireshark_role'($*)) dnl
-
- gen_require(`
- attribute_role wireshark_roles;
- type wireshark_t, wireshark_exec_t, wireshark_home_t;
- type wireshark_tmp_t, wireshark_tmpfs_t;
- ')
-
- roleattribute $1 wireshark_roles;
-
- domtrans_pattern($2, wireshark_exec_t, wireshark_t)
-
- allow $2 wireshark_t:process { ptrace signal_perms };
- ps_process_pattern($2, wireshark_t)
-
- allow $2 { wireshark_tmp_t wireshark_home_t wireshark_tmpfs_t }:dir { manage_dir_perms relabel_dir_perms };
- allow $2 { wireshark_tmp_t wireshark_home_t wireshark_tmpfs_t }:file { manage_file_perms relabel_file_perms };
- allow $2 { wireshark_home_t wireshark_tmpfs_t }:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
- allow $2 wireshark_tmpfs_t:sock_file { manage_sock_file_perms relabel_sock_file_perms };
- allow $2 wireshark_tmpfs_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
- userdom_user_home_dir_filetrans($2, wireshark_home_t, dir, ".wireshark")
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `wireshark_role'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute wireshark in wireshark domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`wireshark_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `wireshark_domtrans'($*)) dnl
-
- gen_require(`
- type wireshark_t, wireshark_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, wireshark_exec_t, wireshark_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `wireshark_domtrans'($*)) dnl
- ')
-
-## Links web browser
-
-#######################################
-##
-## The role interface for the links module.
-##
-##
-##
-## The role associated with the user domain.
-##
-##
-##
-##
-## The type of the user domain.
-##
-##
-#
- define(`links_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `links_role'($*)) dnl
-
- gen_require(`
- type links_t, links_exec_t, links_tmpfs_t, links_home_t;
- ')
-
- #######################################
- #
- # Declarations
- #
-
- role $1 types links_t;
-
- ############################
- #
- # Policy
- #
-
- manage_dirs_pattern($2, links_home_t, links_home_t)
- manage_files_pattern($2, links_home_t, links_home_t)
- manage_lnk_files_pattern($2, links_home_t, links_home_t)
-
- relabel_dirs_pattern($2, links_home_t, links_home_t)
- relabel_files_pattern($2, links_home_t, links_home_t)
- relabel_lnk_files_pattern($2, links_home_t, links_home_t)
-
- domtrans_pattern($2, links_exec_t, links_t)
-
- ps_process_pattern($2, links_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `links_role'($*)) dnl
- ')
-
-## PHP FastCGI Process Manager
-
-#################################################
-##
-## Administrate a phpfpm environment
-##
-##
-##
-## Domain allowed access
-##
-##
-#
- define(`phpfpm_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `phpfpm_admin'($*)) dnl
-
- gen_require(`
- type phpfpm_t;
- type phpfpm_log_t, phpfpm_tmp_t, phpfpm_runtime_t;
- ')
-
- allow $1 phpfpm_t:process { ptrace signal_perms };
- ps_process_pattern($1, phpfpm_t)
-
- logging_list_logs($1)
- admin_pattern($1, phpfpm_log_t)
-
- files_list_tmp($1)
- admin_pattern($1, phpfpm_tmp_t)
-
- files_list_pids($1)
- admin_pattern($1, phpfpm_runtime_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `phpfpm_admin'($*)) dnl
- ')
-
-
-########################################
-##
-## Connect to phpfpm using a unix domain stream socket.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`phpfpm_stream_connect',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `phpfpm_stream_connect'($*)) dnl
-
- gen_require(`
- type phpfpm_t, phpfpm_runtime_t;
- ')
- stream_connect_pattern($1, phpfpm_runtime_t, phpfpm_runtime_t, phpfpm_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `phpfpm_stream_connect'($*)) dnl
- ')
-
-## policy for dirsrv
-#
-# Provided by the 389-ds-base package
-
-########################################
-##
-## Execute a domain transition to run dirsrv.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`dirsrv_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dirsrv_domtrans'($*)) dnl
-
- gen_require(`
- type dirsrv_t, dirsrv_exec_t;
- ')
-
- domain_auto_transition_pattern($1, dirsrv_exec_t, dirsrv_t)
-
- allow dirsrv_t $1:fd use;
- allow dirsrv_t $1:fifo_file rw_file_perms;
- allow dirsrv_t $1:process sigchld;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dirsrv_domtrans'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Allow caller to signal dirsrv.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`dirsrv_signal',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dirsrv_signal'($*)) dnl
-
- gen_require(`
- type dirsrv_t;
- ')
-
- allow $1 dirsrv_t:process signal;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dirsrv_signal'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send a null signal to dirsrv.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`dirsrv_signull',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dirsrv_signull'($*)) dnl
-
- gen_require(`
- type dirsrv_t;
- ')
-
- allow $1 dirsrv_t:process signull;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dirsrv_signull'($*)) dnl
- ')
-
-
-#######################################
-##
-## Allow a domain to manage dirsrv logs.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`dirsrv_manage_log',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dirsrv_manage_log'($*)) dnl
-
- gen_require(`
- type dirsrv_var_log_t;
- ')
-
- allow $1 dirsrv_var_log_t:dir manage_dir_perms;
- allow $1 dirsrv_var_log_t:file manage_file_perms;
- allow $1 dirsrv_var_log_t:fifo_file manage_fifo_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dirsrv_manage_log'($*)) dnl
- ')
-
-
-#######################################
-##
-## Allow a domain to manage dirsrv /var/lib files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`dirsrv_manage_var_lib',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dirsrv_manage_var_lib'($*)) dnl
-
- gen_require(`
- type dirsrv_var_lib_t;
- ')
- allow $1 dirsrv_var_lib_t:dir manage_dir_perms;
- allow $1 dirsrv_var_lib_t:file manage_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dirsrv_manage_var_lib'($*)) dnl
- ')
-
-
-#######################################
-##
-## Allow a domain to manage dirsrv /var/run files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`dirsrv_manage_var_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dirsrv_manage_var_run'($*)) dnl
-
- gen_require(`
- type dirsrv_runtime_t;
- ')
- allow $1 dirsrv_runtime_t:dir manage_dir_perms;
- allow $1 dirsrv_runtime_t:file manage_file_perms;
- allow $1 dirsrv_runtime_t:sock_file manage_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dirsrv_manage_var_run'($*)) dnl
- ')
-
-
-######################################
-##
-## Allow a domain to create dirsrv pid directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`dirsrv_pid_filetrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dirsrv_pid_filetrans'($*)) dnl
-
- gen_require(`
- type dirsrv_runtime_t;
- ')
- # Allow creating a dir in /var/run with this type
- files_pid_filetrans($1, dirsrv_runtime_t, dir)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dirsrv_pid_filetrans'($*)) dnl
- ')
-
-
-#######################################
-##
-## Allow a domain to read dirsrv /var/run files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`dirsrv_read_var_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dirsrv_read_var_run'($*)) dnl
-
- gen_require(`
- type dirsrv_runtime_t;
- ')
- allow $1 dirsrv_runtime_t:dir list_dir_perms;
- allow $1 dirsrv_runtime_t:file read_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dirsrv_read_var_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Manage dirsrv configuration files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`dirsrv_manage_config',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dirsrv_manage_config'($*)) dnl
-
- gen_require(`
- type dirsrv_config_t;
- ')
-
- allow $1 dirsrv_config_t:dir manage_dir_perms;
- allow $1 dirsrv_config_t:file manage_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dirsrv_manage_config'($*)) dnl
- ')
-
-
-########################################
-##
-## Read dirsrv share files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`dirsrv_read_share',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dirsrv_read_share'($*)) dnl
-
- gen_require(`
- type dirsrv_share_t;
- ')
-
- allow $1 dirsrv_share_t:dir list_dir_perms;
- allow $1 dirsrv_share_t:file read_file_perms;
- allow $1 dirsrv_share_t:lnk_file read;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dirsrv_read_share'($*)) dnl
- ')
-
-## Log file monitoring tool
-
-#######################################
-##
-## All of the rules required to administrate
-## a logsentry environment.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`logsentry_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `logsentry_admin'($*)) dnl
-
- gen_require(`
- type logsentry_t, logsentry_etc_t, logsentry_tmp_t, logsentry_filter_t;
- ')
-
- allow $1 logsentry_t:process { ptrace signal_perms };
- ps_process_pattern($1, logsentry_t)
-
- files_list_etc($1)
- admin_pattern($1, logsentry_etc_t)
- admin_pattern($1, logsentry_filter_t)
-
- files_list_tmp($1)
- admin_pattern($1, logsentry_tmp_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `logsentry_admin'($*)) dnl
- ')
-
-## Ceph distributed object storage
-
-#########################################
-##
-## Create the individual Ceph domains
-##
-##
-##
-## The daemon (osd, mds or mon) for which the rules are created
-##
-##
-#
- define(`ceph_domain_template',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `ceph_domain_template'($*)) dnl
-
- gen_require(`
- attribute cephdomain;
- attribute cephdata;
- attribute cephpidfile;
- attribute_role ceph_roles;
-
- type ceph_runtime_t;
- ')
-
- type ceph_$1_t, cephdomain;
- type ceph_$1_exec_t;
- init_system_domain(ceph_$1_t, ceph_$1_exec_t)
- role ceph_roles types ceph_$1_t;
-
- type ceph_$1_data_t, cephdata;
- files_type(ceph_$1_data_t)
-
- type ceph_$1_runtime_t, cephpidfile;
- typealias ceph_$1_runtime_t alias ceph_$1_var_run_t;
- files_pid_file(ceph_$1_runtime_t)
-
- ########################################
- #
- # Local policy
- #
- # Rules which cannot be made part of the domain
-
- allow ceph_$1_t ceph_$1_runtime_t:file manage_file_perms;
- allow ceph_$1_t ceph_$1_runtime_t:sock_file manage_file_perms;
- allow ceph_$1_t ceph_$1_data_t:dir manage_dir_perms;
- allow ceph_$1_t ceph_$1_data_t:file manage_file_perms;
-
- filetrans_pattern(ceph_$1_t, ceph_runtime_t, ceph_$1_runtime_t, { file sock_file })
-
- files_var_lib_filetrans(ceph_$1_t, ceph_$1_data_t, { file dir })
- dnl
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `ceph_domain_template'($*)) dnl
- ')
-
-
-#########################################
-##
-## Administrative access for Ceph
-##
-##
-##
-## Domain allowed access
-##
-##
-##
-##
-## Domain allowed access
-##
-##
-#
- define(`ceph_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `ceph_admin'($*)) dnl
-
- gen_require(`
- attribute cephdomain, cephdata;
- type ceph_initrc_exec_t, ceph_log_t;
- type ceph_conf_t, ceph_key_t;
- ')
-
- allow $1 cephdomain:process { ptrace signal_perms };
- ps_process_pattern($1, cephdomain)
-
- init_startstop_service($1, $2, cephdomain, ceph_initrc_exec_t)
- allow $1 ceph_initrc_exec_t:lnk_file read_lnk_file_perms;
- allow $1 ceph_initrc_exec_t:file read_file_perms;
-
- files_list_etc($1)
- admin_pattern($1, ceph_conf_t)
- admin_pattern($1, ceph_key_t)
-
- admin_pattern($1, cephdata)
-
- admin_pattern($1, ceph_log_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `ceph_admin'($*)) dnl
- ')
-
-
-#########################################
-##
-## Read Ceph key files
-##
-##
-##
-## Domain allowed access
-##
-##
-#
- define(`ceph_read_key',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `ceph_read_key'($*)) dnl
-
- gen_require(`
- type ceph_key_t;
- ')
-
- allow $1 ceph_key_t:file read_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `ceph_read_key'($*)) dnl
- ')
-
-## rtorrent torrent client
-
-#######################################
-##
-## Role access for rtorrent
-##
-##
-##
-## The role associated with the user domain.
-##
-##
-##
-##
-## The user domain.
-##
-##
-#
- define(`rtorrent_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rtorrent_role'($*)) dnl
-
- gen_require(`
- type rtorrent_t, rtorrent_exec_t, rtorrent_home_t, rtorrent_session_t;
- ')
-
- role $1 types rtorrent_t;
-
- domtrans_pattern($2, rtorrent_exec_t, rtorrent_t)
-
- allow $2 rtorrent_t:process signal_perms;
-
- manage_files_pattern($2, rtorrent_home_t, rtorrent_home_t)
-
- manage_files_pattern($2, rtorrent_session_t, rtorrent_session_t)
- manage_dirs_pattern($2, rtorrent_session_t, rtorrent_session_t)
-
- ps_process_pattern($2, rtorrent_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rtorrent_role'($*)) dnl
- ')
-
-
-#######################################
-##
-## Administer the rtorrent application.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`rtorrent_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `rtorrent_admin'($*)) dnl
-
- gen_require(`
- type rtorrent_t;
- ')
-
- allow $1 rtorrent_t:process ptrace;
-
- rtorrent_role($2, $1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `rtorrent_admin'($*)) dnl
- ')
-
-## Dropbox client - Store, Sync and Share Files Online
-
-#######################################
-##
-## The role for using the dropbox client.
-##
-##
-##
-## The role associated with the user domain.
-##
-##
-##
-##
-## The user domain.
-##
-##
-#
- define(`dropbox_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dropbox_role'($*)) dnl
-
- gen_require(`
- type dropbox_t;
- type dropbox_exec_t;
- type dropbox_home_t;
- type dropbox_tmp_t;
- ')
-
- role $1 types dropbox_t;
-
- domtrans_pattern($2, dropbox_exec_t, dropbox_t)
-
- allow $2 dropbox_t:process { ptrace signal_perms };
-
- manage_dirs_pattern($2, dropbox_home_t, dropbox_home_t)
- manage_files_pattern($2, dropbox_home_t, dropbox_home_t)
- manage_sock_files_pattern($2, dropbox_home_t, dropbox_home_t)
-
- manage_files_pattern($2, dropbox_home_t, dropbox_exec_t)
- manage_lnk_files_pattern($2, dropbox_home_t, dropbox_exec_t)
-
- userdom_user_home_dir_filetrans($2, dropbox_home_t, dir, ".dropbox-dist")
- filetrans_pattern($2, dropbox_home_t, dropbox_exec_t, file, "dropbox")
- filetrans_pattern($2, dropbox_home_t, dropbox_exec_t, file, "dropboxd")
-
- manage_dirs_pattern($2, dropbox_tmp_t, dropbox_tmp_t)
- manage_files_pattern($2, dropbox_tmp_t, dropbox_tmp_t)
-
- allow $2 dropbox_content_t:dir relabel_dir_perms;
- allow $2 dropbox_content_t:file relabel_file_perms;
-
- dropbox_manage_content($2)
- dropbox_dbus_chat($2)
-
- ps_process_pattern($2, dropbox_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dropbox_role'($*)) dnl
- ')
-
-
-#########################################
-##
-## Send and receive messages from the dropbox daemon
-## over dbus.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`dropbox_dbus_chat',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dropbox_dbus_chat'($*)) dnl
-
- gen_require(`
- type dropbox_t;
- class dbus send_msg;
- ')
-
- allow $1 dropbox_t:dbus send_msg;
- allow dropbox_t $1:dbus send_msg;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dropbox_dbus_chat'($*)) dnl
- ')
-
-
-#######################################
-##
-## Allow other domains to read dropbox's content files
-##
-##
-##
-## The domain that is allowed read access to the dropbox_content_t files
-##
-##
-#
- define(`dropbox_read_content',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dropbox_read_content'($*)) dnl
-
- gen_require(`
- type dropbox_content_t;
- ')
-
- list_dirs_pattern($1, dropbox_content_t, dropbox_content_t)
- read_files_pattern($1, dropbox_content_t, dropbox_content_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dropbox_read_content'($*)) dnl
- ')
-
-
-#######################################
-##
-## Allow other domains to manage dropbox's content files
-##
-##
-##
-## The domain that is allowed to manage the dropbox_content_t files and directories
-##
-##
-#
- define(`dropbox_manage_content',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dropbox_manage_content'($*)) dnl
-
- gen_require(`
- type dropbox_content_t;
- ')
-
- manage_dirs_pattern($1, dropbox_content_t, dropbox_content_t)
- manage_files_pattern($1, dropbox_content_t, dropbox_content_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dropbox_manage_content'($*)) dnl
- ')
-
-
-## Policy for gorg
-
-#######################################
-##
-## Role access for gorg
-##
-##
-##
-## Role allowed access
-##
-##
-##
-##
-## User domain for the role
-##
-##
-#
- define(`gorg_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `gorg_role'($*)) dnl
-
- gen_require(`
- type gorg_t, gorg_exec_t;
- ')
-
- role $1 types gorg_t;
-
- domain_auto_transition_pattern($2, gorg_exec_t, gorg_t)
- allow $2 gorg_t:process { noatsecure siginh rlimitinh };
- allow gorg_t $2:fd use;
- allow gorg_t $2:process { sigchld signull };
-
- ps_process_pattern($2, gorg_t)
- allow $2 gorg_t:process signal_perms;
- # Needed for command-usage (pipe)
- allow gorg_t $2:fifo_file write;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `gorg_role'($*)) dnl
- ')
-
-## uWSGI server for Python web applications
-
-########################################
-##
-## Connect to uwsgi using a unix
-## domain stream socket.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`uwsgi_stream_connect',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `uwsgi_stream_connect'($*)) dnl
-
- gen_require(`
- type uwsgi_t, uwsgi_run_t;
- ')
-
- files_search_pids($1)
- list_dirs_pattern($1, uwsgi_run_t, uwsgi_run_t)
- stream_connect_pattern($1, uwsgi_run_t, uwsgi_run_t, uwsgi_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `uwsgi_stream_connect'($*)) dnl
- ')
-
-
-########################################
-##
-## Manage uwsgi content.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`uwsgi_manage_content',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `uwsgi_manage_content'($*)) dnl
-
- gen_require(`
- type uwsgi_content_t;
- ')
-
- files_search_pids($1)
- manage_dirs_pattern($1, uwsgi_content_t, uwsgi_content_t)
- manage_files_pattern($1, uwsgi_content_t, uwsgi_content_t)
- manage_lnk_files_pattern($1, uwsgi_content_t, uwsgi_content_t)
-
- manage_files_pattern($1, uwsgi_content_exec_t, uwsgi_content_exec_t)
- manage_lnk_files_pattern($1, uwsgi_content_exec_t, uwsgi_content_exec_t)
-
- optional_policy(`
- apache_manage_sys_content($1)
- ')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `uwsgi_manage_content'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute uwsgi in the uwsgi domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`uwsgi_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `uwsgi_domtrans'($*)) dnl
-
- gen_require(`
- type uwsgi_t, uwsgi_exec_t, uwsgi_content_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, uwsgi_exec_t, uwsgi_t)
- domtrans_pattern($1, uwsgi_content_exec_t, uwsgi_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `uwsgi_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute uwsgi in the callers domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`uwsgi_content_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `uwsgi_content_exec'($*)) dnl
-
- gen_require(`
- type uwsgi_t, uwsgi_exec_t, uwsgi_content_exec_t;
- ')
-
- corecmd_search_bin($1)
- can_exec($1, uwsgi_content_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `uwsgi_content_exec'($*)) dnl
- ')
-
-
-########################################
-##
-## All of the rules required to
-## administrate a uWSGI environment.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-##
-#
- define(`uwsgi_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `uwsgi_admin'($*)) dnl
-
- gen_require(`
- type uwsgi_t, uwsgi_exec_t, uwsgi_conf_t;
- type uwsgi_run_t, uwsgi_var_log_t, uwsgi_tmp_t;
- type uwsgi_content_t, uwsgi_content_exec_t;
- ')
-
- allow $1 uwsgi_t:process { ptrace signal_perms };
- ps_process_pattern($1, uwsgi_t)
-
- files_search_etc($1)
- admin_pattern($1, { uwsgi_conf_t uwsgi_exec_t })
-
- files_search_var($1)
- admin_pattern($1, { uwsgi_content_t uwsgi_content_exec_t })
-
- logging_search_logs($1)
- admin_pattern($1, { uwsgi_var_log_t })
-
- files_search_pids($1)
- admin_pattern($1, uwsgi_run_t)
-
- files_search_tmp($1)
- admin_pattern($1, uwsgi_tmp_t)
-
- corecmd_search_bin($1)
- domtrans_pattern($1, uwsgi_exec_t, uwsgi_t)
- can_exec($1, uwsgi_content_exec_t)
-
- optional_policy(`
- apache_manage_sys_content($1)
- ')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `uwsgi_admin'($*)) dnl
- ')
-
-## Mutt e-mail client
-
-#######################################
-##
-## The role for using the mutt application.
-##
-##
-##
-## The role associated with the user domain.
-##
-##
-##
-##
-## The user domain.
-##
-##
-#
- define(`mutt_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mutt_role'($*)) dnl
-
- gen_require(`
- type mutt_t, mutt_exec_t, mutt_home_t, mutt_conf_t, mutt_etc_t;
- type mutt_tmp_t;
- ')
-
- role $1 types mutt_t;
-
- domtrans_pattern($2, mutt_exec_t, mutt_t)
-
- allow $2 mutt_t:process { ptrace signal_perms };
-
- manage_dirs_pattern($2, mutt_home_t, mutt_home_t)
- manage_files_pattern($2, mutt_home_t, mutt_home_t)
-
- manage_dirs_pattern($2, mutt_conf_t, mutt_conf_t)
- manage_files_pattern($2, mutt_conf_t, mutt_conf_t)
-
- relabel_dirs_pattern($2, mutt_home_t, mutt_home_t)
- relabel_files_pattern($2, mutt_home_t, mutt_home_t)
-
- relabel_dirs_pattern($2, mutt_conf_t, mutt_conf_t)
- relabel_files_pattern($2, mutt_conf_t, mutt_conf_t)
-
- relabel_dirs_pattern($2, mutt_tmp_t, mutt_tmp_t)
- relabel_files_pattern($2, mutt_tmp_t, mutt_tmp_t)
-
- ps_process_pattern($2, mutt_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mutt_role'($*)) dnl
- ')
-
-
-#######################################
-##
-## Allow other domains to read mutt's home files
-##
-##
-##
-## The domain that is allowed read access to the mutt_home_t files
-##
-##
-#
- define(`mutt_read_home_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mutt_read_home_files'($*)) dnl
-
- gen_require(`
- type mutt_home_t;
- ')
-
- read_files_pattern($1, mutt_home_t, mutt_home_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mutt_read_home_files'($*)) dnl
- ')
-
-
-#######################################
-##
-## Allow other domains to read mutt's temporary files
-##
-##
-##
-## The domain that is allowed read access to the temporary files
-##
-##
-#
- define(`mutt_read_tmp_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mutt_read_tmp_files'($*)) dnl
-
- gen_require(`
- type mutt_tmp_t;
- ')
-
- read_files_pattern($1, mutt_tmp_t, mutt_tmp_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mutt_read_tmp_files'($*)) dnl
- ')
-
-
-#######################################
-##
-## Allow other domains to handle mutt's temporary files (used for instance
-## for e-mail drafts)
-##
-##
-##
-## The domain that is allowed read/write access to the temporary files
-##
-##
-#
- define(`mutt_rw_tmp_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `mutt_rw_tmp_files'($*)) dnl
-
- gen_require(`
- type mutt_tmp_t;
- ')
-
- # The use of rw_files_pattern here is not needed, since this incurs the open privilege as well
- allow $1 mutt_tmp_t:dir search_dir_perms;
- allow $1 mutt_tmp_t:file { read write };
- files_search_tmp($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `mutt_rw_tmp_files'($*)) dnl
- ')
-
-## Dracut initramfs creation tool
-
-########################################
-##
-## Execute the dracut program in the dracut domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`dracut_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dracut_domtrans'($*)) dnl
-
- gen_require(`
- type dracut_t, dracut_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, dracut_exec_t, dracut_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dracut_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute dracut in the dracut domain, and
-## allow the specified role the dracut domain.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-##
-##
-## Role allowed access.
-##
-##
-#
- define(`dracut_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dracut_run'($*)) dnl
-
- gen_require(`
- type dracut_t;
- ')
-
- dracut_domtrans($1)
- role $2 types dracut_t;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dracut_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Read/write dracut temporary files
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`dracut_rw_tmp_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `dracut_rw_tmp_files'($*)) dnl
-
- gen_require(`
- type dracut_tmp_t;
- ')
-
- files_search_var($1)
- files_search_tmp($1)
-
- rw_files_pattern($1, dracut_tmp_t, dracut_tmp_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `dracut_rw_tmp_files'($*)) dnl
- ')
-
-
-## Infrastructure management toolset
-
-#########################################
-##
-## All the rules required to administer a salt master environment
-##
-##
-##
-## Domain allowed access
-##
-##
-##
-##
-## Role allowed access
-##
-##
-#
- define(`salt_admin_master',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `salt_admin_master'($*)) dnl
-
- gen_require(`
- type salt_master_t;
- type salt_master_initrc_exec_t;
- type salt_master_exec_t;
- type salt_etc_t;
- type salt_runtime_t;
- type salt_master_runtime_t;
- attribute_role salt_master_roles;
- ')
-
- allow $1 salt_master_t:process { ptrace signal_perms };
- ps_process_pattern($1, salt_master_t)
-
- init_startstop_service($1, $2, salt_master_t, salt_master_initrc_exec_t)
-
- # for debugging?
- role_transition $2 salt_master_exec_t system_r;
- domtrans_pattern($1, salt_master_exec_t, salt_master_t)
-
- roleattribute $2 salt_master_roles;
-
- files_list_etc($1)
- admin_pattern($1, salt_etc_t, salt_etc_t)
-
- allow $1 salt_runtime_t:dir search_dir_perms;
- stream_connect_pattern($1, salt_master_runtime_t, salt_master_runtime_t, salt_master_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `salt_admin_master'($*)) dnl
- ')
-
-
-#########################################
-##
-## All the rules required to administer a salt minion environment
-##
-##
-##
-## Domain allowed access
-##
-##
-##
-##
-## Role allowed access
-##
-##
-#
- define(`salt_admin_minion',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `salt_admin_minion'($*)) dnl
-
- gen_require(`
- type salt_minion_t;
- type salt_minion_initrc_exec_t;
- type salt_minion_exec_t;
- type salt_etc_t;
- attribute_role salt_minion_roles;
- ')
-
- allow $1 salt_minion_t:process { ptrace signal_perms };
- ps_process_pattern($1, salt_minion_t)
-
- init_startstop_service($1, $2, salt_minion_t, salt_minion_initrc_exec_t)
-
- # for debugging
- role_transition $2 salt_minion_exec_t system_r;
- domtrans_pattern($1, salt_minion_exec_t, salt_minion_t)
-
- roleattribute $2 salt_minion_roles;
-
- files_list_etc($1)
- admin_pattern($1, salt_etc_t, salt_etc_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `salt_admin_minion'($*)) dnl
- ')
-
-## policy for kdeconnect
-
-########################################
-##
-## Execute kdeconnect in the kdeconnect domin.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`kdeconnect_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kdeconnect_domtrans'($*)) dnl
-
- gen_require(`
- type kdeconnect_t, kdeconnect_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, kdeconnect_exec_t, kdeconnect_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kdeconnect_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Execute kdeconnect in the kdeconnect domain, and
-## allow the specified role the kdeconnect domain.
-##
-##
-##
-## Domain allowed to transition
-##
-##
-##
-##
-## The role to be allowed the kdeconnect domain.
-##
-##
-#
- define(`kdeconnect_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kdeconnect_run'($*)) dnl
-
- gen_require(`
- type kdeconnect_t;
- ')
-
- kdeconnect_domtrans($1)
- role $2 types kdeconnect_t;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kdeconnect_run'($*)) dnl
- ')
-
-
-########################################
-##
-## Role access for kdeconnect
-##
-##
-##
-## Role allowed access
-##
-##
-##
-##
-## User domain for the role
-##
-##
-#
- define(`kdeconnect_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kdeconnect_role'($*)) dnl
-
- gen_require(`
- type kdeconnect_t;
- ')
-
- role $1 types kdeconnect_t;
-
- kdeconnect_domtrans($2)
-
- allow $2 kdeconnect_t:unix_stream_socket connectto;
- allow kdeconnect_t $2:unix_stream_socket { read write connectto };
-
- ps_process_pattern($2, kdeconnect_t)
- allow $2 kdeconnect_t:process { signull signal sigkill };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kdeconnect_role'($*)) dnl
- ')
-
-
-#########################################
-##
-## Send and receive messages from the kdeconnect daemon
-## over dbus.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kdeconnect_dbus_chat',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kdeconnect_dbus_chat'($*)) dnl
-
- gen_require(`
- type kdeconnect_t;
- class dbus send_msg;
- ')
-
- allow $1 kdeconnect_t:dbus send_msg;
- allow kdeconnect_t $1:dbus send_msg;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kdeconnect_dbus_chat'($*)) dnl
- ')
-
-## Android development tools - adb, fastboot, android studio
-
-#######################################
-##
-## The role for using the android tools.
-##
-##
-##
-## The role associated with the user domain.
-##
-##
-##
-##
-## The user domain.
-##
-##
-#
- define(`android_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `android_role'($*)) dnl
-
- gen_require(`
- type android_tools_t;
- type android_tools_exec_t;
- type android_home_t;
- type android_tmp_t;
- type android_java_t;
- type android_java_exec_t;
- type android_sdk_t;
- ')
-
- role $1 types android_tools_t;
- role $1 types android_java_t;
-
- domtrans_pattern($2, android_tools_exec_t, android_tools_t)
- domtrans_pattern($2, android_java_exec_t, android_java_t)
-
- allow $2 android_tools_t:process { ptrace signal_perms };
- allow $2 android_java_t:process { ptrace signal_perms noatsecure siginh rlimitinh };
-
- manage_dirs_pattern($2, android_home_t, android_home_t)
- manage_files_pattern($2, android_home_t, android_home_t)
- manage_lnk_files_pattern($2, android_home_t, android_home_t)
-
- list_dirs_pattern($2, android_sdk_t, android_sdk_t)
- read_files_pattern($2, android_sdk_t, android_sdk_t)
- read_lnk_files_pattern($2, android_sdk_t, android_sdk_t)
-
- userdom_user_home_dir_filetrans($2, android_home_t, dir, ".android")
- userdom_user_home_dir_filetrans($2, android_home_t, dir, ".AndroidStudioBeta")
- userdom_user_home_dir_filetrans($2, android_home_t, dir, ".AndroidStudio")
-
- manage_dirs_pattern($2, android_tmp_t, android_tmp_t)
- manage_files_pattern($2, android_tmp_t, android_tmp_t)
-
- allow $2 android_home_t:dir relabel_dir_perms;
- allow $2 android_home_t:file relabel_file_perms;
- allow $2 android_tools_exec_t:file relabel_file_perms;
-
- ps_process_pattern($2, android_tools_t)
- ps_process_pattern($2, android_java_t)
-
- android_dbus_chat($2)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `android_role'($*)) dnl
- ')
-
-
-#########################################
-##
-## Execute the android tools commands in the
-## android tools domain.
-##
-##
-##
-## Domain allowed access.
-##
-##
-
- define(`android_tools_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `android_tools_domtrans'($*)) dnl
-
- gen_require(`
- type android_tools_t;
- type android_tools_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, android_tools_exec_t, android_tools_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `android_tools_domtrans'($*)) dnl
- ')
-
-
-#########################################
-##
-## Send and receive messages from the android java
-## domain over dbus.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`android_dbus_chat',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `android_dbus_chat'($*)) dnl
-
- gen_require(`
- type android_java_t;
- class dbus send_msg;
- ')
-
- allow $1 android_java_t:dbus send_msg;
- allow android_java_t $1:dbus send_msg;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `android_dbus_chat'($*)) dnl
- ')
-
-## OpenResolv network configuration management
-
-#########################################
-##
-## Mark the domain as a resolvconf client, automatically granting
-## the necessary privileges (execute resolvconf and type access).
-##
-##
-##
-## Domain to mark as a resolvconf client
-##
-##
-#
- define(`resolvconf_client_domain',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `resolvconf_client_domain'($*)) dnl
-
- gen_require(`
- attribute resolvconf_client;
- ')
-
- typeattribute $1 resolvconf_client;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `resolvconf_client_domain'($*)) dnl
- ')
-
-
-#########################################
-##
-## Assign the proper permissions to the domain, such as
-## executing resolvconf and accessing its types.
-##
-##
-##
-## Domain to assign proper permissions to
-##
-##
-#
- define(`resolvconf_client_domain_privs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `resolvconf_client_domain_privs'($*)) dnl
-
- resolvconf_domtrans($1)
- resolvconf_generic_run_filetrans_run($1, dir, "resolvconf")
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `resolvconf_client_domain_privs'($*)) dnl
- ')
-
-
-#########################################
-##
-## Execute resolvconf and transition to the resolvconf_t domain
-##
-##
-##
-## Domain allowed to transition
-##
-##
-#
- define(`resolvconf_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `resolvconf_domtrans'($*)) dnl
-
- gen_require(`
- type resolvconf_t;
- type resolvconf_exec_t;
- ')
-
- domtrans_pattern($1, resolvconf_exec_t, resolvconf_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `resolvconf_domtrans'($*)) dnl
- ')
-
-
-#########################################
-##
-## Execute resolvconf in the calling domain (no transition)
-##
-##
-##
-## Domain allowed to execute
-##
-##
-#
- define(`resolvconf_exec',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `resolvconf_exec'($*)) dnl
-
- gen_require(`
- type resolvconf_exec_t;
- ')
-
- can_exec($1, resolvconf_exec_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `resolvconf_exec'($*)) dnl
- ')
-
-
-#########################################
-##
-## Transition to resolvconf_run_t when creating resources
-## inside the generic run directory
-##
-##
-##
-## Domain allowed access
-##
-##
-##
-##
-## Class on which a file transition has to occur
-##
-##
-##
-##
-## Name of the resource on which a file transition has to occur
-##
-##
-#
- define(`resolvconf_generic_run_filetrans_run',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `resolvconf_generic_run_filetrans_run'($*)) dnl
-
- gen_require(`
- type resolvconf_runtime_t;
- ')
-
- files_pid_filetrans($1, resolvconf_runtime_t, $2, $3)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `resolvconf_generic_run_filetrans_run'($*)) dnl
- ')
-
-##
-## Flash player
-##
-
-#####################################
-##
-## Manage the Flash player home files
-##
-##
-##
-## Domain allowed access
-##
-##
-#
- define(`flash_manage_home',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `flash_manage_home'($*)) dnl
-
- gen_require(`
- type flash_home_t;
- ')
-
- manage_files_pattern($1, flash_home_t, flash_home_t)
- manage_dirs_pattern($1, flash_home_t, flash_home_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `flash_manage_home'($*)) dnl
- ')
-
-####################################
-##
-## Relabel the flash home resources
-##
-##
-##
-## Domain allowed access
-##
-##
-#
- define(`flash_relabel_home',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `flash_relabel_home'($*)) dnl
-
- gen_require(`
- type flash_home_t;
- ')
-
- relabel_files_pattern($1, flash_home_t, flash_home_t)
- relabel_dirs_pattern($1, flash_home_t, flash_home_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `flash_relabel_home'($*)) dnl
- ')
-
-##
-## Google Talk
-##
-
-##########################################
-##
-## Grant the plugin domain the needed privileges to launch and
-## interact with the GoogleTalk application. Used for web browser
-## plugin domains.
-##
-##
-##
-## Domain allowed access
-##
-##
-#
- define(`googletalk_plugin_domain',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `googletalk_plugin_domain'($*)) dnl
-
- gen_require(`
- type googletalk_plugin_t;
- type googletalk_plugin_xdg_config_t;
- ')
-
- allow $1 googletalk_plugin_t:fd use;
- allow $1 googletalk_plugin_t:unix_stream_socket { read write };
-
- allow googletalk_plugin_t $1:unix_dgram_socket sendto;
-
- # GoogleTalk process binds on an unreserved port, the client (plugin)
- # then connects to this port
- corenet_tcp_connect_all_unreserved_ports($1)
-
- googletalk_domtrans_plugin($1)
-
- # Create .config/google-googletalkplugin with correct type
- manage_dirs_pattern($1, googletalk_plugin_xdg_config_t, googletalk_plugin_xdg_config_t)
- manage_files_pattern($1, googletalk_plugin_xdg_config_t, googletalk_plugin_xdg_config_t)
- xdg_config_home_filetrans($1, googletalk_plugin_xdg_config_t, dir, "google-googletalkplugin")
- xdg_search_config_home_dirs($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `googletalk_plugin_domain'($*)) dnl
- ')
-
-
-#######################################
-##
-## Execute Google talk plugin in the Google talk plugin domain
-##
-##
-##
-## Domain allowed to transition
-##
-##
-#
- define(`googletalk_domtrans_plugin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `googletalk_domtrans_plugin'($*)) dnl
-
- gen_require(`
- type googletalk_plugin_t, googletalk_plugin_exec_t;
- ')
-
- corecmd_search_bin($1)
- domtrans_pattern($1, googletalk_plugin_exec_t, googletalk_plugin_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `googletalk_domtrans_plugin'($*)) dnl
- ')
-
-
-#######################################
-##
-## Execute Google talk plugin in the Google talk plugin domain,
-## and allow the specified role the google talk plugin domain.
-##
-##
-##
-## Domain allowed to transition
-##
-##
-##
-##
-## Role allowed access
-##
-##
-#
- define(`googletalk_run_plugin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `googletalk_run_plugin'($*)) dnl
-
- gen_require(`
- type googletalk_plugin_t;
- ')
-
- googletalk_domtrans_plugin($1)
- role $2 types googletalk_plugin_t;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `googletalk_run_plugin'($*)) dnl
- ')
-
-
-########################################
-##
-## Use the file descriptor of googletalk plugin
-##
-##
-##
-## Domain allowed access
-##
-##
-#
- define(`googletalk_use_plugin_fds',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `googletalk_use_plugin_fds'($*)) dnl
-
- gen_require(`
- type googletalk_plugin_t;
- ')
-
- allow $1 googletalk_plugin_t:fd use;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `googletalk_use_plugin_fds'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write to the google talk plugin inherited stream sockets
-##
-##
-##
-## Domain allowed access
-##
-##
-#
- define(`googletalk_rw_inherited_plugin_unix_stream_sockets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `googletalk_rw_inherited_plugin_unix_stream_sockets'($*)) dnl
-
- gen_require(`
- type googletalk_plugin_t;
- ')
-
- allow $1 googletalk_plugin_t:unix_stream_socket { read write };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `googletalk_rw_inherited_plugin_unix_stream_sockets'($*)) dnl
- ')
-
-
-########################################
-##
-## Create objects in the xdg config home location
-## with an automatic type transition to the googletalk
-## plugin xdg config home type
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## The class of the object to be created.
-##
-##
-##
-##
-## Name of the file or directory created
-##
-##
-#
- define(`googletalk_generic_xdg_config_home_filetrans_plugin_xdg_config',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `googletalk_generic_xdg_config_home_filetrans_plugin_xdg_config'($*)) dnl
-
- gen_require(`
- type googletalk_plugin_xdg_config_t;
- ')
-
- xdg_config_home_filetrans($1, googletalk_plugin_xdg_config_t, $2, $3)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `googletalk_generic_xdg_config_home_filetrans_plugin_xdg_config'($*)) dnl
- ')
-
-
-#######################################
-##
-## Manage google talk plugin xdg configuration
-##
-##
-##
-## Domain allowed access
-##
-##
-#
- define(`googletalk_manage_plugin_xdg_config',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `googletalk_manage_plugin_xdg_config'($*)) dnl
-
- gen_require(`
- type googletalk_plugin_xdg_config_t;
- ')
-
- manage_dirs_pattern($1, googletalk_plugin_xdg_config_t, googletalk_plugin_xdg_config_t)
- manage_files_pattern($1, googletalk_plugin_xdg_config_t, googletalk_plugin_xdg_config_t)
-
- xdg_search_config_home_dirs($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `googletalk_manage_plugin_xdg_config'($*)) dnl
- ')
-
-## At daemon for running a task a single time
-
-########################################
-##
-## Role access for at
-##
-##
-##
-## Role allowed access
-##
-##
-##
-##
-## User domain for the role
-##
-##
-#
- define(`at_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `at_role'($*)) dnl
-
- gen_require(`
- type at_exec_t;
- type at_t;
- type atd_t;
- type at_job_log_t;
- type at_job_t;
- ')
-
- ##############################
- #
- # Declarations
- #
-
- role $1 types at_t;
-
- ##############################
- #
- # Local policy
- #
-
- domtrans_pattern($2, at_exec_t, at_t)
-
- allow $2 at_t:process signal_perms;
-
- ps_process_pattern($2, at_t)
-
- allow atd_t $2:process transition;
- allow atd_t $2:fd use;
- allow atd_t $2:key manage_key_perms;
- dontaudit atd_t $2:process { noatsecure siginh rlimitinh };
-
- allow $2 atd_t:process sigchld;
- allow $2 atd_t:fd use;
-
- allow $2 at_job_t:file read_inherited_file_perms;
- allow $2 at_job_log_t:file rw_inherited_file_perms;
-
- corecmd_shell_entry_type($2)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `at_role'($*)) dnl
- ')
-
-
-########################################
-##
-## Read from and write to the the inherited atd
-## joblog file
-##
-##
-##
-## Domain allowed access
-##
-##
-#
- define(`at_rw_inherited_job_log_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `at_rw_inherited_job_log_files'($*)) dnl
-
- gen_require(`
- type at_job_log_t;
- ')
-
- allow $1 at_job_log_t:file rw_inherited_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `at_rw_inherited_job_log_files'($*)) dnl
- ')
-
-## Subsonic Music Streaming Server
-## Pan news reader client
-
-########################################
-##
-## Role access for pan
-##
-##
-##
-## Role allowed access
-##
-##
-##
-##
-## User domain for the role
-##
-##
-#
- define(`pan_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `pan_role'($*)) dnl
-
- gen_require(`
- type pan_t, pan_exec_t, pan_home_t;
- ')
- role $1 types pan_t;
-
- allow $2 pan_t:process signal_perms;
-
- domtrans_pattern($2, pan_exec_t, pan_t)
-
- ps_process_pattern($2, pan_t)
-
- manage_dirs_pattern($2, pan_home_t, pan_home_t)
- manage_files_pattern($2, pan_home_t, pan_home_t)
- manage_lnk_files_pattern($2, pan_home_t, pan_home_t)
-
- relabel_dirs_pattern($2, pan_home_t, pan_home_t)
- relabel_files_pattern($2, pan_home_t, pan_home_t)
- relabel_lnk_files_pattern($2, pan_home_t, pan_home_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `pan_role'($*)) dnl
- ')
-
-
-###############################################################################
-# SELinux module for the NGINX Web Server
-#
-# Project Contact Information:
-# Stuart Cianos
-# Email: scianos@alphavida.com
-#
-###############################################################################
-# (C) Copyright 2009 by Stuart Cianos, d/b/a AlphaVida. All Rights Reserved.
-#
-#
-# Stuart Cianos licenses this file to You under the GNU General Public License,
-# Version 3.0 (the "License"); you may not use this file except in compliance
-# with the License. You may obtain a copy of the License at
-#
-# http://www.gnu.org/licenses/gpl.txt
-#
-# or in the COPYING file included in the original archive.
-#
-# Disclaimer of Warranty.
-#
-# THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
-# APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
-# HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
-# OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
-# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
-# PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
-# IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
-# ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
-#
-# Limitation of Liability.
-#
-# IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
-# WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
-# THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
-# GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
-# USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
-# DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
-# PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
-# EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
-# SUCH DAMAGES.
-###############################################################################
-## policy for nginx
-
-########################################
-##
-## Execute a domain transition to run nginx.
-##
-##
-##
-## Domain allowed to transition.
-##
-##
-#
- define(`nginx_domtrans',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `nginx_domtrans'($*)) dnl
-
- gen_require(`
- type nginx_t, nginx_exec_t;
- ')
- allow nginx_t $1:fd use;
- allow nginx_t $1:fifo_file rw_file_perms;
- allow nginx_t $1:process sigchld;
-
- domain_auto_transition_pattern($1, nginx_exec_t, nginx_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `nginx_domtrans'($*)) dnl
- ')
-
-
-########################################
-##
-## Administer the nginx domain
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## The role to be allowed to manage the nginx domain.
-##
-##
-##
-#
- define(`nginx_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `nginx_admin'($*)) dnl
-
- gen_require(`
- type nginx_t, nginx_conf_t, nginx_log_t, nginx_var_lib_t, nginx_runtime_t;
- type nginx_exec_t;
- ')
-
- allow $1 nginx_t:process { ptrace signal_perms };
- ps_process_pattern($1, nginx_t)
-
- files_list_etc($1)
- admin_pattern($1, nginx_conf_t)
-
- can_exec($1, nginx_exec_t)
-
- files_list_var_lib($1)
- admin_pattern($1, nginx_var_lib_t)
-
- logging_list_logs($1)
- admin_pattern($1, nginx_log_t)
-
- files_list_pids($1)
- admin_pattern($1, nginx_runtime_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `nginx_admin'($*)) dnl
- ')
-
-## Skype softphone.
-
-#######################################
-##
-## Role access for the skype module.
-##
-##
-##
-## The role associated with the user domain.
-##
-##
-##
-##
-## The type of the user domain.
-##
-##
-#
- define(`skype_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `skype_role'($*)) dnl
-
- gen_require(`
- type skype_t, skype_exec_t, skype_tmpfs_t, skype_home_t;
- ')
-
- role $1 types skype_t;
-
- domtrans_pattern($2, skype_exec_t, skype_t)
-
- allow $2 skype_t:process { ptrace signal_perms };
- dontaudit skype_t $2:unix_stream_socket { connectto };
-
- manage_dirs_pattern($2, skype_home_t, skype_home_t)
- manage_files_pattern($2, skype_home_t, skype_home_t)
- manage_lnk_files_pattern($2, skype_home_t, skype_home_t)
-
- relabel_dirs_pattern($2, skype_home_t, skype_home_t)
- relabel_files_pattern($2, skype_home_t, skype_home_t)
- relabel_lnk_files_pattern($2, skype_home_t, skype_home_t)
-
- ps_process_pattern($2, skype_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `skype_role'($*)) dnl
- ')
-
-## OpenRC is an init system
-## Build whatis database from man pages
-## Virtual Distributed Ethernet switch service
-
-########################################
-##
-# The rules needed to manage the VDE switches
-##
-##
-##
-## The role to be allowed to manage the vde domain.
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`vde_role',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `vde_role'($*)) dnl
-
- gen_require(`
- type vde_t, vde_tmp_t;
- type vde_runtime_t;
- type vde_initrc_exec_t, vde_exec_t;
- ')
-
- role $1 types vde_t;
-
- allow $2 vde_t:process { ptrace signal_perms };
- allow $2 vde_t:unix_stream_socket connectto;
- allow vde_t $2:process { sigchld signull };
- allow vde_t $2:fd use;
- allow vde_t $2:tun_socket { relabelfrom };
- allow vde_t self:tun_socket { relabelfrom relabelto };
- ps_process_pattern($2, vde_t)
-
- domain_auto_transition_pattern($2, vde_exec_t, vde_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `vde_role'($*)) dnl
- ')
-
-
-########################################
-##
-# Allow communication with the VDE service
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`vde_connect',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `vde_connect'($*)) dnl
-
- gen_require(`
- type vde_t, vde_runtime_t, vde_tmp_t;
- ')
-
- allow $1 vde_runtime_t:sock_file write_sock_file_perms;
- allow $1 vde_t:unix_stream_socket { connectto };
- allow $1 vde_t:unix_dgram_socket { sendto };
- allow vde_t $1:unix_dgram_socket { sendto };
-
- allow $1 vde_tmp_t:sock_file manage_sock_file_perms;
- files_tmp_filetrans($1, vde_tmp_t, sock_file)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `vde_connect'($*)) dnl
- ')
-
-## Bitcoin software-based online payment system
-
-#########################################
-##
-## Administer a bitcoin environment
-##
-##
-##
-## Domain allowed access
-##
-##
-##
-##
-## Role allowed access
-##
-##
-#
- define(`bitcoin_admin',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `bitcoin_admin'($*)) dnl
-
- gen_require(`
- type bitcoin_t;
- type bitcoin_etc_t, bitcoin_tmp_t, bitcoin_log_t;
- type bitcoin_var_lib_t, bitcoin_runtime_t;
- type bitcoin_initrc_exec_t;
- ')
-
- allow $1 bitcoin_t:process { ptrace signal_perms };
- ps_process_pattern($1, bitcoin_t)
-
- init_startstop_service($1, $2, bitcoin_t, bitcoin_initrc_exec_t)
-
- files_list_tmp($1)
- admin_pattern($1, bitcoin_tmp_t)
-
- logging_list_logs($1)
- admin_pattern($1, bitcoin_log_t)
-
- files_list_etc($1)
- admin_pattern($1, bitcoin_etc_t)
-
- files_list_var_lib($1)
- admin_pattern($1, bitcoin_var_lib_t)
-
- files_list_pids($1)
- admin_pattern($1, bitcoin_runtime_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `bitcoin_admin'($*)) dnl
- ')
-
-#
-# This is a generated file! Instead of modifying this file, the
-# corenetwork.if.in or corenetwork.if.m4 file should be modified.
-#
-## Policy controlling access to network objects
-##
-## Contains the initial SIDs for network objects.
-##
-
-########################################
-##
-## Define type to be a network port type
-##
-##
-##
-## Define type to be a network port type
-##
-##
-## This is for supporting third party modules and its
-## use is not allowed in upstream reference policy.
-##
-##
-##
-##
-## Type to be used for network ports.
-##
-##
-#
- define(`corenet_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_port'($*)) dnl
-
- gen_require(`
- attribute port_type;
- ')
-
- typeattribute $1 port_type;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Define network type to be a reserved port (lt 1024)
-##
-##
-##
-## Define network type to be a reserved port (lt 1024)
-##
-##
-## This is for supporting third party modules and its
-## use is not allowed in upstream reference policy.
-##
-##
-##
-##
-## Type to be used for network ports.
-##
-##
-#
- define(`corenet_reserved_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_reserved_port'($*)) dnl
-
- gen_require(`
- attribute reserved_port_type;
- ')
-
- typeattribute $1 reserved_port_type;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_reserved_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Define network type to be a rpc port ( 512 lt PORT lt 1024)
-##
-##
-##
-## Define network type to be a rpc port ( 512 lt PORT lt 1024)
-##
-##
-## This is for supporting third party modules and its
-## use is not allowed in upstream reference policy.
-##
-##
-##
-##
-## Type to be used for network ports.
-##
-##
-#
- define(`corenet_rpc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_rpc_port'($*)) dnl
-
- gen_require(`
- attribute rpc_port_type;
- ')
-
- typeattribute $1 rpc_port_type;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_rpc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Define type to be a network node type
-##
-##
-##
-## Define type to be a network node type
-##
-##
-## This is for supporting third party modules and its
-## use is not allowed in upstream reference policy.
-##
-##
-##
-##
-## Type to be used for network nodes.
-##
-##
-#
- define(`corenet_node',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_node'($*)) dnl
-
- gen_require(`
- attribute node_type;
- ')
-
- typeattribute $1 node_type;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_node'($*)) dnl
- ')
-
-
-########################################
-##
-## Define type to be a network packet type
-##
-##
-##
-## Define type to be a network packet type
-##
-##
-## This is for supporting third party modules and its
-## use is not allowed in upstream reference policy.
-##
-##
-##
-##
-## Type to be used for a network packet.
-##
-##
-#
- define(`corenet_packet',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_packet'($*)) dnl
-
- gen_require(`
- attribute packet_type;
- ')
-
- typeattribute $1 packet_type;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_packet'($*)) dnl
- ')
-
-
-########################################
-##
-## Define type to be a network client packet type
-##
-##
-##
-## Define type to be a network client packet type
-##
-##
-## This is for supporting third party modules and its
-## use is not allowed in upstream reference policy.
-##
-##
-##
-##
-## Type to be used for a network client packet.
-##
-##
-#
- define(`corenet_client_packet',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_client_packet'($*)) dnl
-
- gen_require(`
- attribute packet_type, client_packet_type;
- ')
-
- typeattribute $1 client_packet_type, packet_type;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_client_packet'($*)) dnl
- ')
-
-
-########################################
-##
-## Define type to be a network server packet type
-##
-##
-##
-## Define type to be a network server packet type
-##
-##
-## This is for supporting third party modules and its
-## use is not allowed in upstream reference policy.
-##
-##
-##
-##
-## Type to be used for a network server packet.
-##
-##
-#
- define(`corenet_server_packet',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_server_packet'($*)) dnl
-
- gen_require(`
- attribute packet_type, server_packet_type;
- ')
-
- typeattribute $1 server_packet_type, packet_type;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_server_packet'($*)) dnl
- ')
-
-
-########################################
-##
-## Make the specified type usable
-## for labeled ipsec.
-##
-##
-##
-## Type to be used for labeled ipsec.
-##
-##
-#
- define(`corenet_spd_type',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_spd_type'($*)) dnl
-
- gen_require(`
- attribute ipsec_spd_type;
- ')
-
- typeattribute $1 ipsec_spd_type;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_spd_type'($*)) dnl
- ')
-
-
-########################################
-##
-## Define type to be an infiniband pkey type
-##
-##
-##
-## Define type to be an infiniband pkey type
-##
-##
-## This is for supporting third party modules and its
-## use is not allowed in upstream reference policy.
-##
-##
-##
-##
-## Type to be used for infiniband pkeys.
-##
-##
-#
- define(`corenet_ib_pkey',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_ib_pkey'($*)) dnl
-
- gen_require(`
- attribute ibpkey_type;
- ')
-
- typeattribute $1 ibpkey_type;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_ib_pkey'($*)) dnl
- ')
-
-
-########################################
-##
-## Define type to be an infiniband endport
-##
-##
-##
-## Define type to be an infiniband endport
-##
-##
-## This is for supporting third party modules and its
-## use is not allowed in upstream reference policy.
-##
-##
-##
-##
-## Type to be used for infiniband endports.
-##
-##
-#
- define(`corenet_ib_endport',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_ib_endport'($*)) dnl
-
- gen_require(`
- attribute ibendport_type;
- ')
-
- typeattribute $1 ibendport_type;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_ib_endport'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive TCP network traffic on generic interfaces.
-##
-##
-##
-## Allow the specified domain to send and receive TCP network
-## traffic on generic network interfaces.
-##
-##
-## Related interface:
-##
-##
-## - corenet_all_recvfrom_unlabeled()
-## - corenet_tcp_sendrecv_generic_node()
-## - corenet_tcp_sendrecv_all_ports()
-## - corenet_tcp_connect_all_ports()
-##
-##
-## Example client being able to connect to all ports over
-## generic nodes, without labeled networking:
-##
-##
-## allow myclient_t self:tcp_socket create_stream_socket_perms;
-## corenet_tcp_sendrecv_generic_if(myclient_t)
-## corenet_tcp_sendrecv_generic_node(myclient_t)
-## corenet_tcp_sendrecv_all_ports(myclient_t)
-## corenet_tcp_connect_all_ports(myclient_t)
-## corenet_all_recvfrom_unlabeled(myclient_t)
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_generic_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_generic_if'($*)) dnl
-
- gen_require(`
- type netif_t;
- ')
-
- allow $1 netif_t:netif { egress ingress };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_generic_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP network traffic on generic interfaces.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_send_generic_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_generic_if'($*)) dnl
-
- gen_require(`
- type netif_t;
- ')
-
- allow $1 netif_t:netif { egress };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_generic_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Dontaudit attempts to send UDP network traffic
-## on generic interfaces.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_udp_send_generic_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_generic_if'($*)) dnl
-
- gen_require(`
- type netif_t;
- ')
-
- dontaudit $1 netif_t:netif { egress };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_generic_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP network traffic on generic interfaces.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_receive_generic_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_generic_if'($*)) dnl
-
- gen_require(`
- type netif_t;
- ')
-
- allow $1 netif_t:netif { ingress };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_generic_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP network
-## traffic on generic interfaces.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_generic_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_generic_if'($*)) dnl
-
- gen_require(`
- type netif_t;
- ')
-
- dontaudit $1 netif_t:netif { ingress };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_generic_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP network traffic on generic interfaces.
-##
-##
-##
-## Allow the specified domain to send and receive UDP network
-## traffic on generic network interfaces.
-##
-##
-## Related interface:
-##
-##
-## - corenet_all_recvfrom_unlabeled()
-## - corenet_udp_sendrecv_generic_node()
-## - corenet_udp_sendrecv_all_ports()
-##
-##
-## Example client being able to send to all ports over
-## generic nodes, without labeled networking:
-##
-##
-## allow myclient_t self:udp_socket create_socket_perms;
-## corenet_udp_sendrecv_generic_if(myclient_t)
-## corenet_udp_sendrecv_generic_node(myclient_t)
-## corenet_udp_sendrecv_all_ports(myclient_t)
-## corenet_all_recvfrom_unlabeled(myclient_t)
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_generic_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_generic_if'($*)) dnl
-
- corenet_udp_send_generic_if($1)
- corenet_udp_receive_generic_if($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_generic_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive UDP network
-## traffic on generic interfaces.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_generic_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_generic_if'($*)) dnl
-
- corenet_dontaudit_udp_send_generic_if($1)
- corenet_dontaudit_udp_receive_generic_if($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_generic_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Send raw IP packets on generic interfaces.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_raw_send_generic_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_raw_send_generic_if'($*)) dnl
-
- gen_require(`
- type netif_t;
- ')
-
- allow $1 netif_t:netif { egress };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_raw_send_generic_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive raw IP packets on generic interfaces.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_raw_receive_generic_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_raw_receive_generic_if'($*)) dnl
-
- gen_require(`
- type netif_t;
- ')
-
- allow $1 netif_t:netif { ingress };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_raw_receive_generic_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive raw IP packets on generic interfaces.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_raw_sendrecv_generic_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_raw_sendrecv_generic_if'($*)) dnl
-
- corenet_raw_send_generic_if($1)
- corenet_raw_receive_generic_if($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_raw_sendrecv_generic_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow outgoing network traffic on the generic interfaces.
-##
-##
-##
-## The peer label of the outgoing network traffic.
-##
-##
-##
-#
- define(`corenet_out_generic_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_out_generic_if'($*)) dnl
-
- gen_require(`
- type netif_t;
- ')
-
- allow $1 netif_t:netif egress;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_out_generic_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow incoming traffic on the generic interfaces.
-##
-##
-##
-## The peer label of the incoming network traffic.
-##
-##
-##
-#
- define(`corenet_in_generic_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_in_generic_if'($*)) dnl
-
- gen_require(`
- type netif_t;
- ')
-
- allow $1 netif_t:netif ingress;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_in_generic_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow incoming and outgoing network traffic on the generic interfaces.
-##
-##
-##
-## The peer label of the network traffic.
-##
-##
-##
-#
- define(`corenet_inout_generic_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_inout_generic_if'($*)) dnl
-
- corenet_in_generic_if($1)
- corenet_out_generic_if($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_inout_generic_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive TCP network traffic on all interfaces.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_sendrecv_all_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_all_if'($*)) dnl
-
- gen_require(`
- attribute netif_type;
- ')
-
- allow $1 netif_type:netif { egress ingress };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_all_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP network traffic on all interfaces.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_send_all_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_all_if'($*)) dnl
-
- gen_require(`
- attribute netif_type;
- ')
-
- allow $1 netif_type:netif { egress };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_all_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP network traffic on all interfaces.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_receive_all_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_all_if'($*)) dnl
-
- gen_require(`
- attribute netif_type;
- ')
-
- allow $1 netif_type:netif { ingress };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_all_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP network traffic on all interfaces.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_sendrecv_all_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_all_if'($*)) dnl
-
- corenet_udp_send_all_if($1)
- corenet_udp_receive_all_if($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_all_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Send raw IP packets on all interfaces.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_raw_send_all_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_raw_send_all_if'($*)) dnl
-
- gen_require(`
- attribute netif_type;
- ')
-
- allow $1 netif_type:netif { egress };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_raw_send_all_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive SCTP network traffic on generic nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_sctp_sendrecv_generic_node',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sctp_sendrecv_generic_node'($*)) dnl
-
- gen_require(`
- type node_t;
- ')
-
- allow $1 node_t:node { sendto recvfrom };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sctp_sendrecv_generic_node'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive raw IP packets on all interfaces.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_raw_receive_all_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_raw_receive_all_if'($*)) dnl
-
- gen_require(`
- attribute netif_type;
- ')
-
- allow $1 netif_type:netif { ingress };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_raw_receive_all_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive raw IP packets on all interfaces.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_raw_sendrecv_all_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_raw_sendrecv_all_if'($*)) dnl
-
- corenet_raw_send_all_if($1)
- corenet_raw_receive_all_if($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_raw_sendrecv_all_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive TCP network traffic on generic nodes.
-##
-##
-##
-## Allow the specified domain to send and receive TCP network
-## traffic to/from generic network nodes (hostnames/networks).
-##
-##
-## Related interface:
-##
-##
-## - corenet_all_recvfrom_unlabeled()
-## - corenet_tcp_sendrecv_generic_if()
-## - corenet_tcp_sendrecv_all_ports()
-## - corenet_tcp_connect_all_ports()
-##
-##
-## Example client being able to connect to all ports over
-## generic nodes, without labeled networking:
-##
-##
-## allow myclient_t self:tcp_socket create_stream_socket_perms;
-## corenet_tcp_sendrecv_generic_if(myclient_t)
-## corenet_tcp_sendrecv_generic_node(myclient_t)
-## corenet_tcp_sendrecv_all_ports(myclient_t)
-## corenet_tcp_connect_all_ports(myclient_t)
-## corenet_all_recvfrom_unlabeled(myclient_t)
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_generic_node',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_generic_node'($*)) dnl
-
- gen_require(`
- type node_t;
- ')
-
- allow $1 node_t:node { sendto recvfrom };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_generic_node'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP network traffic on generic nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_send_generic_node',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_generic_node'($*)) dnl
-
- gen_require(`
- type node_t;
- ')
-
- allow $1 node_t:node { sendto };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_generic_node'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP network traffic on generic nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_receive_generic_node',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_generic_node'($*)) dnl
-
- gen_require(`
- type node_t;
- ')
-
- allow $1 node_t:node { recvfrom };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_generic_node'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP network traffic on generic nodes.
-##
-##
-##
-## Allow the specified domain to send and receive UDP network
-## traffic to/from generic network nodes (hostnames/networks).
-##
-##
-## Related interface:
-##
-##
-## - corenet_all_recvfrom_unlabeled()
-## - corenet_udp_sendrecv_generic_if()
-## - corenet_udp_sendrecv_all_ports()
-##
-##
-## Example client being able to send to all ports over
-## generic nodes, without labeled networking:
-##
-##
-## allow myclient_t self:udp_socket create_socket_perms;
-## corenet_udp_sendrecv_generic_if(myclient_t)
-## corenet_udp_sendrecv_generic_node(myclient_t)
-## corenet_udp_sendrecv_all_ports(myclient_t)
-## corenet_all_recvfrom_unlabeled(myclient_t)
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_generic_node',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_generic_node'($*)) dnl
-
- corenet_udp_send_generic_node($1)
- corenet_udp_receive_generic_node($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_generic_node'($*)) dnl
- ')
-
-
-########################################
-##
-## Send raw IP packets on generic nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_raw_send_generic_node',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_raw_send_generic_node'($*)) dnl
-
- gen_require(`
- type node_t;
- ')
-
- allow $1 node_t:node { sendto };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_raw_send_generic_node'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive raw IP packets on generic nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_raw_receive_generic_node',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_raw_receive_generic_node'($*)) dnl
-
- gen_require(`
- type node_t;
- ')
-
- allow $1 node_t:node { recvfrom };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_raw_receive_generic_node'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive raw IP packets on generic nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_raw_sendrecv_generic_node',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_raw_sendrecv_generic_node'($*)) dnl
-
- corenet_raw_send_generic_node($1)
- corenet_raw_receive_generic_node($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_raw_sendrecv_generic_node'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind SCTP sockets to generic nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_sctp_bind_generic_node',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sctp_bind_generic_node'($*)) dnl
-
- gen_require(`
- type node_t;
- ')
-
- allow $1 node_t:sctp_socket node_bind;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sctp_bind_generic_node'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to generic nodes.
-##
-##
-##
-## Bind TCP sockets to generic nodes. This is
-## necessary for binding a socket so it
-## can be used for servers to listen
-## for incoming connections.
-##
-##
-## Related interface:
-##
-##
-## - corenet_udp_bind_generic_node()
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_generic_node',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_generic_node'($*)) dnl
-
- gen_require(`
- type node_t;
- ')
-
- allow $1 node_t:tcp_socket node_bind;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_generic_node'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to generic nodes.
-##
-##
-##
-## Bind UDP sockets to generic nodes. This is
-## necessary for binding a socket so it
-## can be used for servers to listen
-## for incoming connections.
-##
-##
-## Related interface:
-##
-##
-## - corenet_tcp_bind_generic_node()
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_generic_node',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_generic_node'($*)) dnl
-
- gen_require(`
- type node_t;
- ')
-
- allow $1 node_t:udp_socket node_bind;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_generic_node'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind raw sockets to generic nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-# rawip_socket node_bind does not make much sense.
-# cjp: vmware hits this too
- define(`corenet_raw_bind_generic_node',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_raw_bind_generic_node'($*)) dnl
-
- gen_require(`
- type node_t;
- ')
-
- allow $1 node_t:rawip_socket node_bind;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_raw_bind_generic_node'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow outgoing network traffic to generic nodes.
-##
-##
-##
-## The peer label of the outgoing network traffic.
-##
-##
-##
-#
- define(`corenet_out_generic_node',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_out_generic_node'($*)) dnl
-
- gen_require(`
- type node_t;
- ')
-
- allow $1 node_t:node sendto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_out_generic_node'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow incoming network traffic from generic nodes.
-##
-##
-##
-## The peer label of the incoming network traffic.
-##
-##
-##
-#
- define(`corenet_in_generic_node',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_in_generic_node'($*)) dnl
-
- gen_require(`
- type node_t;
- ')
-
- allow $1 node_t:node recvfrom;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_in_generic_node'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow incoming and outgoing network traffic with generic nodes.
-##
-##
-##
-## The peer label of the network traffic.
-##
-##
-##
-#
- define(`corenet_inout_generic_node',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_inout_generic_node'($*)) dnl
-
- corenet_in_generic_node($1)
- corenet_out_generic_node($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_inout_generic_node'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive TCP network traffic on all nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_sendrecv_all_nodes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_all_nodes'($*)) dnl
-
- gen_require(`
- attribute node_type;
- ')
-
- allow $1 node_type:node { sendto recvfrom };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_all_nodes'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP network traffic on all nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_send_all_nodes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_all_nodes'($*)) dnl
-
- gen_require(`
- attribute node_type;
- ')
-
- allow $1 node_type:node { sendto };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_all_nodes'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP network
-## traffic on any nodes.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_udp_send_all_nodes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_all_nodes'($*)) dnl
-
- gen_require(`
- attribute node_type;
- ')
-
- dontaudit $1 node_type:node { sendto };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_all_nodes'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive SCTP network traffic on all nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_sctp_sendrecv_all_nodes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sctp_sendrecv_all_nodes'($*)) dnl
-
- gen_require(`
- attribute node_type;
- ')
-
- allow $1 node_type:node { sendto recvfrom };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sctp_sendrecv_all_nodes'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP network traffic on all nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_receive_all_nodes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_all_nodes'($*)) dnl
-
- gen_require(`
- attribute node_type;
- ')
-
- allow $1 node_type:node { recvfrom };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_all_nodes'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP
-## network traffic on all nodes.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_all_nodes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_all_nodes'($*)) dnl
-
- gen_require(`
- attribute node_type;
- ')
-
- dontaudit $1 node_type:node { recvfrom };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_all_nodes'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP network traffic on all nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_sendrecv_all_nodes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_all_nodes'($*)) dnl
-
- corenet_udp_send_all_nodes($1)
- corenet_udp_receive_all_nodes($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_all_nodes'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive UDP
-## network traffic on any nodes nodes.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_all_nodes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_all_nodes'($*)) dnl
-
- corenet_dontaudit_udp_send_all_nodes($1)
- corenet_dontaudit_udp_receive_all_nodes($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_all_nodes'($*)) dnl
- ')
-
-
-########################################
-##
-## Send raw IP packets on all nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_raw_send_all_nodes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_raw_send_all_nodes'($*)) dnl
-
- gen_require(`
- attribute node_type;
- ')
-
- allow $1 node_type:node { sendto };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_raw_send_all_nodes'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive raw IP packets on all nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_raw_receive_all_nodes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_raw_receive_all_nodes'($*)) dnl
-
- gen_require(`
- attribute node_type;
- ')
-
- allow $1 node_type:node { recvfrom };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_raw_receive_all_nodes'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive raw IP packets on all nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_raw_sendrecv_all_nodes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_raw_sendrecv_all_nodes'($*)) dnl
-
- corenet_raw_send_all_nodes($1)
- corenet_raw_receive_all_nodes($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_raw_sendrecv_all_nodes'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to all nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_bind_all_nodes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_all_nodes'($*)) dnl
-
- gen_require(`
- attribute node_type;
- ')
-
- allow $1 node_type:tcp_socket node_bind;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_all_nodes'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to all nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_bind_all_nodes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_all_nodes'($*)) dnl
-
- gen_require(`
- attribute node_type;
- ')
-
- allow $1 node_type:udp_socket node_bind;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_all_nodes'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind raw sockets to all nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-# rawip_socket node_bind does not make much sense.
-# cjp: vmware hits this too
- define(`corenet_raw_bind_all_nodes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_raw_bind_all_nodes'($*)) dnl
-
- gen_require(`
- attribute node_type;
- ')
-
- allow $1 node_type:rawip_socket node_bind;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_raw_bind_all_nodes'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive TCP network traffic on generic ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_sendrecv_generic_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_generic_port'($*)) dnl
-
- refpolicywarn(`$0($*) has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_generic_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind SCTP sockets to all nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_sctp_bind_all_nodes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sctp_bind_all_nodes'($*)) dnl
-
- gen_require(`
- attribute node_type;
- ')
-
- allow $1 node_type:sctp_socket node_bind;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sctp_bind_all_nodes'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Do not audit send and receive TCP network traffic on generic ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_dontaudit_tcp_sendrecv_generic_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_tcp_sendrecv_generic_port'($*)) dnl
-
- refpolicywarn(`$0($*) has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_tcp_sendrecv_generic_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP network traffic on generic ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_send_generic_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_generic_port'($*)) dnl
-
- refpolicywarn(`$0($*) has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_generic_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP network traffic on generic ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_receive_generic_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_generic_port'($*)) dnl
-
- refpolicywarn(`$0($*) has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_generic_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP network traffic on generic ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_sendrecv_generic_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_generic_port'($*)) dnl
-
- refpolicywarn(`$0($*) has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_generic_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to generic ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_bind_generic_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_generic_port'($*)) dnl
-
- gen_require(`
- type port_t;
- attribute defined_port_type;
- ')
-
- allow $1 port_t:tcp_socket name_bind;
- dontaudit $1 defined_port_type:tcp_socket name_bind;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_generic_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit bind TCP sockets to generic ports.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_tcp_bind_generic_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_tcp_bind_generic_port'($*)) dnl
-
- gen_require(`
- type port_t;
- ')
-
- dontaudit $1 port_t:tcp_socket name_bind;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_tcp_bind_generic_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to generic ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_bind_generic_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_generic_port'($*)) dnl
-
- gen_require(`
- type port_t;
- attribute defined_port_type;
- ')
-
- allow $1 port_t:udp_socket name_bind;
- dontaudit $1 defined_port_type:udp_socket name_bind;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_generic_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Connect TCP sockets to generic ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_generic_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_generic_port'($*)) dnl
-
- gen_require(`
- type port_t;
- ')
-
- allow $1 port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_generic_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive TCP network traffic on all ports.
-##
-##
-##
-## Send and receive TCP network traffic on all ports.
-## Related interfaces:
-##
-##
-## - corenet_all_recvfrom_unlabeled()
-## - corenet_tcp_sendrecv_generic_if()
-## - corenet_tcp_sendrecv_generic_node()
-## - corenet_tcp_connect_all_ports()
-## - corenet_tcp_bind_all_ports()
-##
-##
-## Example client being able to connect to all ports over
-## generic nodes, without labeled networking:
-##
-##
-## allow myclient_t self:tcp_socket create_stream_socket_perms;
-## corenet_tcp_sendrecv_generic_if(myclient_t)
-## corenet_tcp_sendrecv_generic_node(myclient_t)
-## corenet_tcp_sendrecv_all_ports(myclient_t)
-## corenet_tcp_connect_all_ports(myclient_t)
-## corenet_all_recvfrom_unlabeled(myclient_t)
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_all_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_all_ports'($*)) dnl
-
- refpolicywarn(`$0($*) has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_all_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP network traffic on all ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_send_all_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_all_ports'($*)) dnl
-
- refpolicywarn(`$0($*) has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_all_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind SCTP sockets to generic ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_sctp_bind_generic_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sctp_bind_generic_port'($*)) dnl
-
- gen_require(`
- type port_t, unreserved_port_t, ephemeral_port_t;
- attribute defined_port_type;
- ')
-
- allow $1 { port_t unreserved_port_t ephemeral_port_t }:sctp_socket name_bind;
- dontaudit $1 defined_port_type:sctp_socket name_bind;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sctp_bind_generic_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP network traffic on all ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_receive_all_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_all_ports'($*)) dnl
-
- refpolicywarn(`$0($*) has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_all_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP network traffic on all ports.
-##
-##
-##
-## Send and receive UDP network traffic on all ports.
-## Related interfaces:
-##
-##
-## - corenet_all_recvfrom_unlabeled()
-## - corenet_udp_sendrecv_generic_if()
-## - corenet_udp_sendrecv_generic_node()
-## - corenet_udp_bind_all_ports()
-##
-##
-## Example client being able to send to all ports over
-## generic nodes, without labeled networking:
-##
-##
-## allow myclient_t self:udp_socket create_socket_perms;
-## corenet_udp_sendrecv_generic_if(myclient_t)
-## corenet_udp_sendrecv_generic_node(myclient_t)
-## corenet_udp_sendrecv_all_ports(myclient_t)
-## corenet_all_recvfrom_unlabeled(myclient_t)
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_all_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_all_ports'($*)) dnl
-
- refpolicywarn(`$0($*) has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_all_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to bind SCTP
-## sockets to generic ports.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_sctp_bind_generic_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sctp_bind_generic_port'($*)) dnl
-
- gen_require(`
- type port_t, unreserved_port_t, ephemeral_port_t;
- ')
-
- dontaudit $1 { port_t unreserved_port_t ephemeral_port_t }:sctp_socket name_bind;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sctp_bind_generic_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to all ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_bind_all_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_all_ports'($*)) dnl
-
- gen_require(`
- attribute port_type;
- ')
-
- allow $1 port_type:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_all_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attepts to bind TCP sockets to any ports.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_tcp_bind_all_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_tcp_bind_all_ports'($*)) dnl
-
- gen_require(`
- attribute port_type;
- ')
-
- dontaudit $1 port_type:tcp_socket name_bind;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_tcp_bind_all_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to all ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_bind_all_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_all_ports'($*)) dnl
-
- gen_require(`
- attribute port_type;
- ')
-
- allow $1 port_type:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_all_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Connect SCTP sockets to generic ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_sctp_connect_generic_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sctp_connect_generic_port'($*)) dnl
-
- gen_require(`
- type port_t, unreserved_port_t,ephemeral_port_t;
- ')
-
- allow $1 { port_t unreserved_port_t ephemeral_port_t }:sctp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sctp_connect_generic_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attepts to bind UDP sockets to any ports.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_udp_bind_all_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_bind_all_ports'($*)) dnl
-
- gen_require(`
- attribute port_type;
- ')
-
- dontaudit $1 port_type:udp_socket name_bind;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_bind_all_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Connect TCP sockets to all ports.
-##
-##
-##
-## Connect TCP sockets to all ports
-##
-##
-## Related interfaces:
-##
-##
-## - corenet_all_recvfrom_unlabeled()
-## - corenet_tcp_sendrecv_generic_if()
-## - corenet_tcp_sendrecv_generic_node()
-## - corenet_tcp_sendrecv_all_ports()
-## - corenet_tcp_bind_all_ports()
-##
-##
-## Example client being able to connect to all ports over
-## generic nodes, without labeled networking:
-##
-##
-## allow myclient_t self:tcp_socket create_stream_socket_perms;
-## corenet_tcp_sendrecv_generic_if(myclient_t)
-## corenet_tcp_sendrecv_generic_node(myclient_t)
-## corenet_tcp_sendrecv_all_ports(myclient_t)
-## corenet_tcp_connect_all_ports(myclient_t)
-## corenet_all_recvfrom_unlabeled(myclient_t)
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_connect_all_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_all_ports'($*)) dnl
-
- gen_require(`
- attribute port_type;
- ')
-
- allow $1 port_type:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_all_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to connect TCP sockets
-## to all ports.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_tcp_connect_all_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_tcp_connect_all_ports'($*)) dnl
-
- gen_require(`
- attribute port_type;
- ')
-
- dontaudit $1 port_type:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_tcp_connect_all_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive TCP network traffic on generic reserved ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_sendrecv_reserved_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_reserved_port'($*)) dnl
-
- refpolicywarn(`$0($*) has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_reserved_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP network traffic on generic reserved ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_send_reserved_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_reserved_port'($*)) dnl
-
- refpolicywarn(`$0($*) has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_reserved_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP network traffic on generic reserved ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_receive_reserved_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_reserved_port'($*)) dnl
-
- refpolicywarn(`$0($*) has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_reserved_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP network traffic on generic reserved ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_sendrecv_reserved_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_reserved_port'($*)) dnl
-
- refpolicywarn(`$0($*) has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_reserved_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to generic reserved ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_bind_reserved_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_reserved_port'($*)) dnl
-
- gen_require(`
- type reserved_port_t;
- ')
-
- allow $1 reserved_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_reserved_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind SCTP sockets to all ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_sctp_bind_all_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sctp_bind_all_ports'($*)) dnl
-
- gen_require(`
- attribute port_type;
- ')
-
- allow $1 port_type:sctp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sctp_bind_all_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to generic reserved ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_bind_reserved_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_reserved_port'($*)) dnl
-
- gen_require(`
- type reserved_port_t;
- ')
-
- allow $1 reserved_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_reserved_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Connect TCP sockets to generic reserved ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_reserved_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_reserved_port'($*)) dnl
-
- gen_require(`
- type reserved_port_t;
- ')
-
- allow $1 reserved_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_reserved_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to bind SCTP sockets to any ports.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_sctp_bind_all_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sctp_bind_all_ports'($*)) dnl
-
- gen_require(`
- attribute port_type;
- ')
-
- dontaudit $1 port_type:sctp_socket name_bind;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sctp_bind_all_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive TCP network traffic on all reserved ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_sendrecv_all_reserved_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_all_reserved_ports'($*)) dnl
-
- refpolicywarn(`$0($*) has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_all_reserved_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP network traffic on all reserved ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_send_all_reserved_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_all_reserved_ports'($*)) dnl
-
- refpolicywarn(`$0($*) has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_all_reserved_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP network traffic on all reserved ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_receive_all_reserved_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_all_reserved_ports'($*)) dnl
-
- refpolicywarn(`$0($*) has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_all_reserved_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP network traffic on all reserved ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_sendrecv_all_reserved_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_all_reserved_ports'($*)) dnl
-
- refpolicywarn(`$0($*) has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_all_reserved_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Connect SCTP sockets to all ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_sctp_connect_all_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sctp_connect_all_ports'($*)) dnl
-
- gen_require(`
- attribute port_type;
- ')
-
- allow $1 port_type:sctp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sctp_connect_all_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to all reserved ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_bind_all_reserved_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_all_reserved_ports'($*)) dnl
-
- gen_require(`
- attribute reserved_port_type;
- ')
-
- allow $1 reserved_port_type:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_all_reserved_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to bind TCP sockets to all reserved ports.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_tcp_bind_all_reserved_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_tcp_bind_all_reserved_ports'($*)) dnl
-
- gen_require(`
- attribute reserved_port_type;
- ')
-
- dontaudit $1 reserved_port_type:tcp_socket name_bind;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_tcp_bind_all_reserved_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to all reserved ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_bind_all_reserved_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_all_reserved_ports'($*)) dnl
-
- gen_require(`
- attribute reserved_port_type;
- ')
-
- allow $1 reserved_port_type:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_all_reserved_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to bind UDP sockets to all reserved ports.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_udp_bind_all_reserved_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_bind_all_reserved_ports'($*)) dnl
-
- gen_require(`
- attribute reserved_port_type;
- ')
-
- dontaudit $1 reserved_port_type:udp_socket name_bind;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_bind_all_reserved_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to connect SCTP sockets
-## to all ports.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_sctp_connect_all_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sctp_connect_all_ports'($*)) dnl
-
- gen_require(`
- attribute port_type;
- ')
-
- dontaudit $1 port_type:sctp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sctp_connect_all_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to all ports > 1024.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_bind_all_unreserved_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_all_unreserved_ports'($*)) dnl
-
- gen_require(`
- attribute unreserved_port_type;
- ')
-
- allow $1 unreserved_port_type:tcp_socket name_bind;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_all_unreserved_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to all ports > 1024.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_bind_all_unreserved_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_all_unreserved_ports'($*)) dnl
-
- gen_require(`
- attribute unreserved_port_type;
- ')
-
- allow $1 unreserved_port_type:udp_socket name_bind;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_all_unreserved_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Connect TCP sockets to reserved ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_all_reserved_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_all_reserved_ports'($*)) dnl
-
- gen_require(`
- attribute reserved_port_type;
- ')
-
- allow $1 reserved_port_type:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_all_reserved_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Connect SCTP sockets to all ports > 1024.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_sctp_connect_all_unreserved_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sctp_connect_all_unreserved_ports'($*)) dnl
-
- gen_require(`
- attribute unreserved_port_type;
- ')
-
- allow $1 unreserved_port_type:sctp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sctp_connect_all_unreserved_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit connect attempts to TCP sockets on
-## ports greater than 1024.
-##
-##
-##
-## Domain not to audit access to.
-##
-##
-#
- define(`corenet_dontaudit_tcp_connect_all_unreserved_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_tcp_connect_all_unreserved_ports'($*)) dnl
-
- gen_require(`
- attribute unreserved_port_type;
- ')
-
- dontaudit $1 unreserved_port_type:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_tcp_connect_all_unreserved_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Connect TCP sockets to all ports > 1024.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_all_unreserved_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_all_unreserved_ports'($*)) dnl
-
- gen_require(`
- attribute unreserved_port_type;
- ')
-
- allow $1 unreserved_port_type:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_all_unreserved_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to connect TCP sockets
-## all reserved ports.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_tcp_connect_all_reserved_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_tcp_connect_all_reserved_ports'($*)) dnl
-
- gen_require(`
- attribute reserved_port_type;
- ')
-
- dontaudit $1 reserved_port_type:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_tcp_connect_all_reserved_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Connect TCP sockets to rpc ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_all_rpc_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_all_rpc_ports'($*)) dnl
-
- gen_require(`
- attribute rpc_port_type;
- ')
-
- allow $1 rpc_port_type:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_all_rpc_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to connect TCP sockets
-## all rpc ports.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_tcp_connect_all_rpc_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_tcp_connect_all_rpc_ports'($*)) dnl
-
- gen_require(`
- attribute rpc_port_type;
- ')
-
- dontaudit $1 rpc_port_type:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_tcp_connect_all_rpc_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind SCTP sockets to generic reserved ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_sctp_bind_reserved_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sctp_bind_reserved_port'($*)) dnl
-
- gen_require(`
- type reserved_port_t;
- ')
-
- allow $1 reserved_port_t:sctp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sctp_bind_reserved_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Read the TUN/TAP virtual network device.
-##
-##
-##
-## The domain read allowed access.
-##
-##
-#
- define(`corenet_read_tun_tap_dev',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_read_tun_tap_dev'($*)) dnl
-
- gen_require(`
- type tun_tap_device_t;
- ')
-
- dev_list_all_dev_nodes($1)
- allow $1 tun_tap_device_t:chr_file read_chr_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_read_tun_tap_dev'($*)) dnl
- ')
-
-
-########################################
-##
-## Write the TUN/TAP virtual network device.
-##
-##
-##
-## The domain allowed write access.
-##
-##
-#
- define(`corenet_write_tun_tap_dev',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_write_tun_tap_dev'($*)) dnl
-
- gen_require(`
- type tun_tap_device_t;
- ')
-
- dev_list_all_dev_nodes($1)
- allow $1 tun_tap_device_t:chr_file write_chr_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_write_tun_tap_dev'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write the TUN/TAP virtual network device.
-##
-##
-##
-## The domain allowed access.
-##
-##
-#
- define(`corenet_rw_tun_tap_dev',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_rw_tun_tap_dev'($*)) dnl
-
- gen_require(`
- type tun_tap_device_t;
- ')
-
- dev_list_all_dev_nodes($1)
- allow $1 tun_tap_device_t:chr_file rw_chr_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_rw_tun_tap_dev'($*)) dnl
- ')
-
-
-########################################
-##
-## Connect SCTP sockets to generic reserved ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_sctp_connect_reserved_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sctp_connect_reserved_port'($*)) dnl
-
- gen_require(`
- type reserved_port_t;
- ')
-
- allow $1 reserved_port_t:sctp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sctp_connect_reserved_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to read or write the TUN/TAP
-## virtual network device.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_rw_tun_tap_dev',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_rw_tun_tap_dev'($*)) dnl
-
- gen_require(`
- type tun_tap_device_t;
- ')
-
- dontaudit $1 tun_tap_device_t:chr_file { read write };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_rw_tun_tap_dev'($*)) dnl
- ')
-
-
-########################################
-##
-## Getattr the point-to-point device.
-##
-##
-##
-## The domain allowed access.
-##
-##
-#
- define(`corenet_getattr_ppp_dev',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_getattr_ppp_dev'($*)) dnl
-
- gen_require(`
- type ppp_device_t;
- ')
-
- allow $1 ppp_device_t:chr_file getattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_getattr_ppp_dev'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write the point-to-point device.
-##
-##
-##
-## The domain allowed access.
-##
-##
-#
- define(`corenet_rw_ppp_dev',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_rw_ppp_dev'($*)) dnl
-
- gen_require(`
- type ppp_device_t;
- ')
-
- dev_list_all_dev_nodes($1)
- allow $1 ppp_device_t:chr_file rw_chr_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_rw_ppp_dev'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to all RPC ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_bind_all_rpc_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_all_rpc_ports'($*)) dnl
-
- gen_require(`
- attribute rpc_port_type;
- ')
-
- allow $1 rpc_port_type:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_all_rpc_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to bind TCP sockets to all RPC ports.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_tcp_bind_all_rpc_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_tcp_bind_all_rpc_ports'($*)) dnl
-
- gen_require(`
- attribute rpc_port_type;
- ')
-
- dontaudit $1 rpc_port_type:tcp_socket name_bind;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_tcp_bind_all_rpc_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to all RPC ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_bind_all_rpc_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_all_rpc_ports'($*)) dnl
-
- gen_require(`
- attribute rpc_port_type;
- ')
-
- allow $1 rpc_port_type:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_all_rpc_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to bind UDP sockets to all RPC ports.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_udp_bind_all_rpc_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_bind_all_rpc_ports'($*)) dnl
-
- gen_require(`
- attribute rpc_port_type;
- ')
-
- dontaudit $1 rpc_port_type:udp_socket name_bind;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_bind_all_rpc_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind SCTP sockets to all reserved ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_sctp_bind_all_reserved_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sctp_bind_all_reserved_ports'($*)) dnl
-
- gen_require(`
- attribute reserved_port_type;
- ')
-
- allow $1 reserved_port_type:sctp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sctp_bind_all_reserved_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive TCP packets from a NetLabel connection.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_recvfrom_netlabel',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_recvfrom_netlabel'($*)) dnl
-
- gen_require(`
- type netlabel_peer_t;
- ')
-
- allow $1 netlabel_peer_t:peer recv;
- allow $1 netlabel_peer_t:tcp_socket recvfrom;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_recvfrom_netlabel'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive TCP packets from an unlabled connection.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_recvfrom_unlabeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_recvfrom_unlabeled'($*)) dnl
-
- kernel_tcp_recvfrom_unlabeled($1)
- kernel_recvfrom_unlabeled_peer($1)
-
- # XXX - at some point the oubound/send access check will be removed
- # but for right now we need to keep this in place so as not to break
- # older systems
- kernel_sendrecv_unlabeled_association($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_recvfrom_unlabeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to bind SCTP sockets to all reserved ports.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_sctp_bind_all_reserved_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sctp_bind_all_reserved_ports'($*)) dnl
-
- gen_require(`
- attribute reserved_port_type;
- ')
-
- dontaudit $1 reserved_port_type:sctp_socket name_bind;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sctp_bind_all_reserved_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive TCP packets from a NetLabel
-## connection.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_tcp_recvfrom_netlabel',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_tcp_recvfrom_netlabel'($*)) dnl
-
- gen_require(`
- type netlabel_peer_t;
- ')
-
- dontaudit $1 netlabel_peer_t:peer recv;
- dontaudit $1 netlabel_peer_t:tcp_socket recvfrom;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_tcp_recvfrom_netlabel'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive TCP packets from an unlabeled
-## connection.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_tcp_recvfrom_unlabeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_tcp_recvfrom_unlabeled'($*)) dnl
-
- kernel_dontaudit_tcp_recvfrom_unlabeled($1)
- kernel_dontaudit_recvfrom_unlabeled_peer($1)
-
- # XXX - at some point the oubound/send access check will be removed
- # but for right now we need to keep this in place so as not to break
- # older systems
- kernel_dontaudit_sendrecv_unlabeled_association($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_tcp_recvfrom_unlabeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP packets from a NetLabel connection.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_recvfrom_netlabel',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_recvfrom_netlabel'($*)) dnl
-
- gen_require(`
- type netlabel_peer_t;
- ')
-
- allow $1 netlabel_peer_t:peer recv;
- allow $1 netlabel_peer_t:udp_socket recvfrom;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_recvfrom_netlabel'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP packets from an unlabeled connection.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_udp_recvfrom_unlabeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_recvfrom_unlabeled'($*)) dnl
-
- kernel_udp_recvfrom_unlabeled($1)
- kernel_recvfrom_unlabeled_peer($1)
-
- # XXX - at some point the oubound/send access check will be removed
- # but for right now we need to keep this in place so as not to break
- # older systems
- kernel_sendrecv_unlabeled_association($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_recvfrom_unlabeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind SCTP sockets to all ports > 1024.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_sctp_bind_all_unreserved_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sctp_bind_all_unreserved_ports'($*)) dnl
-
- gen_require(`
- attribute unreserved_port_type;
- ')
-
- allow $1 unreserved_port_type:sctp_socket name_bind;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sctp_bind_all_unreserved_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP packets from a NetLabel
-## connection.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_udp_recvfrom_netlabel',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_recvfrom_netlabel'($*)) dnl
-
- gen_require(`
- type netlabel_peer_t;
- ')
-
- dontaudit $1 netlabel_peer_t:peer recv;
- dontaudit $1 netlabel_peer_t:udp_socket recvfrom;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_recvfrom_netlabel'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP packets from an unlabeled
-## connection.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_udp_recvfrom_unlabeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_recvfrom_unlabeled'($*)) dnl
-
- kernel_dontaudit_udp_recvfrom_unlabeled($1)
- kernel_dontaudit_recvfrom_unlabeled_peer($1)
-
- # XXX - at some point the oubound/send access check will be removed
- # but for right now we need to keep this in place so as not to break
- # older systems
- kernel_dontaudit_sendrecv_unlabeled_association($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_recvfrom_unlabeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive Raw IP packets from a NetLabel connection.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_raw_recvfrom_netlabel',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_raw_recvfrom_netlabel'($*)) dnl
-
- gen_require(`
- type netlabel_peer_t;
- ')
-
- allow $1 netlabel_peer_t:peer recv;
- allow $1 netlabel_peer_t:rawip_socket recvfrom;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_raw_recvfrom_netlabel'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive Raw IP packets from an unlabeled connection.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_raw_recvfrom_unlabeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_raw_recvfrom_unlabeled'($*)) dnl
-
- kernel_raw_recvfrom_unlabeled($1)
- kernel_recvfrom_unlabeled_peer($1)
-
- # XXX - at some point the oubound/send access check will be removed
- # but for right now we need to keep this in place so as not to break
- # older systems
- kernel_sendrecv_unlabeled_association($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_raw_recvfrom_unlabeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive Raw IP packets from a NetLabel
-## connection.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_raw_recvfrom_netlabel',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_raw_recvfrom_netlabel'($*)) dnl
-
- gen_require(`
- type netlabel_peer_t;
- ')
-
- dontaudit $1 netlabel_peer_t:peer recv;
- dontaudit $1 netlabel_peer_t:rawip_socket recvfrom;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_raw_recvfrom_netlabel'($*)) dnl
- ')
-
-
-########################################
-##
-## Connect SCTP sockets to reserved ports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_sctp_connect_all_reserved_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sctp_connect_all_reserved_ports'($*)) dnl
-
- gen_require(`
- attribute reserved_port_type;
- ')
-
- allow $1 reserved_port_type:sctp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sctp_connect_all_reserved_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive Raw IP packets from an unlabeled
-## connection.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_raw_recvfrom_unlabeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_raw_recvfrom_unlabeled'($*)) dnl
-
- kernel_dontaudit_raw_recvfrom_unlabeled($1)
- kernel_dontaudit_recvfrom_unlabeled_peer($1)
-
- # XXX - at some point the oubound/send access check will be removed
- # but for right now we need to keep this in place so as not to break
- # older systems
- kernel_dontaudit_sendrecv_unlabeled_association($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_raw_recvfrom_unlabeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive packets from an unlabeled connection.
-##
-##
-##
-## Allow the specified domain to receive packets from an
-## unlabeled connection. On machines that do not utilize
-## labeled networking, this will be required on all
-## networking domains. On machines tha do utilize
-## labeled networking, this will be required for any
-## networking domain that is allowed to receive
-## network traffic that does not have a label.
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_all_recvfrom_unlabeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_all_recvfrom_unlabeled'($*)) dnl
-
- kernel_tcp_recvfrom_unlabeled($1)
- kernel_udp_recvfrom_unlabeled($1)
- kernel_raw_recvfrom_unlabeled($1)
- kernel_recvfrom_unlabeled_peer($1)
-
- # XXX - at some point the oubound/send access check will be removed
- # but for right now we need to keep this in place so as not to break
- # older systems
- kernel_sendrecv_unlabeled_association($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_all_recvfrom_unlabeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive packets from a NetLabel connection.
-##
-##
-##
-## Allow the specified domain to receive NetLabel
-## network traffic, which utilizes the Commercial IP
-## Security Option (CIPSO) to set the MLS level
-## of the network packets. This is required for
-## all networking domains that receive NetLabel
-## network traffic.
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_all_recvfrom_netlabel',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_all_recvfrom_netlabel'($*)) dnl
-
- gen_require(`
- type netlabel_peer_t;
- ')
-
- allow $1 netlabel_peer_t:peer recv;
- allow $1 netlabel_peer_t:{ tcp_socket udp_socket rawip_socket } recvfrom;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_all_recvfrom_netlabel'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive packets from an unlabeled connection.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_dontaudit_all_recvfrom_unlabeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_all_recvfrom_unlabeled'($*)) dnl
-
- kernel_dontaudit_tcp_recvfrom_unlabeled($1)
- kernel_dontaudit_udp_recvfrom_unlabeled($1)
- kernel_dontaudit_raw_recvfrom_unlabeled($1)
- kernel_dontaudit_recvfrom_unlabeled_peer($1)
-
- # XXX - at some point the oubound/send access check will be removed
- # but for right now we need to keep this in place so as not to break
- # older systems
- kernel_dontaudit_sendrecv_unlabeled_association($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_all_recvfrom_unlabeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to connect SCTP sockets
-## all reserved ports.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_sctp_connect_all_reserved_ports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sctp_connect_all_reserved_ports'($*)) dnl
-
- gen_require(`
- attribute reserved_port_type;
- ')
-
- dontaudit $1 reserved_port_type:sctp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sctp_connect_all_reserved_ports'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive packets from a NetLabel
-## connection.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`corenet_dontaudit_all_recvfrom_netlabel',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_all_recvfrom_netlabel'($*)) dnl
-
- gen_require(`
- type netlabel_peer_t;
- ')
-
- dontaudit $1 netlabel_peer_t:peer recv;
- dontaudit $1 netlabel_peer_t:{ tcp_socket udp_socket rawip_socket } recvfrom;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_all_recvfrom_netlabel'($*)) dnl
- ')
-
-
-########################################
-##
-## Rules for receiving labeled TCP packets.
-##
-##
-##
-## Rules for receiving labeled TCP packets.
-##
-##
-## Due to the nature of TCP, this is bidirectional.
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Peer domain.
-##
-##
-#
- define(`corenet_tcp_recvfrom_labeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_recvfrom_labeled'($*)) dnl
-
- allow { $1 $2 } self:association sendto;
- allow $1 $2:{ association tcp_socket } recvfrom;
- allow $2 $1:{ association tcp_socket } recvfrom;
-
- allow $1 $2:peer recv;
- allow $2 $1:peer recv;
-
- # allow receiving packets from MLS-only peers using NetLabel
- corenet_tcp_recvfrom_netlabel($1)
- corenet_tcp_recvfrom_netlabel($2)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_recvfrom_labeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Rules for receiving labeled UDP packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Peer domain.
-##
-##
-#
- define(`corenet_udp_recvfrom_labeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_recvfrom_labeled'($*)) dnl
-
- allow $2 self:association sendto;
- allow $1 $2:{ association udp_socket } recvfrom;
-
- allow $1 $2:peer recv;
-
- # allow receiving packets from MLS-only peers using NetLabel
- corenet_udp_recvfrom_netlabel($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_recvfrom_labeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Rules for receiving labeled raw IP packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Peer domain.
-##
-##
-#
- define(`corenet_raw_recvfrom_labeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_raw_recvfrom_labeled'($*)) dnl
-
- allow $2 self:association sendto;
- allow $1 $2:{ association rawip_socket } recvfrom;
-
- allow $1 $2:peer recv;
-
- # allow receiving packets from MLS-only peers using NetLabel
- corenet_raw_recvfrom_netlabel($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_raw_recvfrom_labeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Rules for receiving labeled packets via TCP, UDP and raw IP.
-##
-##
-##
-## Rules for receiving labeled packets via TCP, UDP and raw IP.
-##
-##
-## Due to the nature of TCP, the rules (for TCP
-## networking only) are bidirectional.
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Peer domain.
-##
-##
-#
- define(`corenet_all_recvfrom_labeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_all_recvfrom_labeled'($*)) dnl
-
- corenet_sctp_recvfrom_labeled($1, $2)
- corenet_tcp_recvfrom_labeled($1, $2)
- corenet_udp_recvfrom_labeled($1, $2)
- corenet_raw_recvfrom_labeled($1, $2)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_all_recvfrom_labeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow specified type to set the context of
-## a SPD entry for labeled ipsec associations.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_setcontext_all_spds',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_setcontext_all_spds'($*)) dnl
-
- gen_require(`
- attribute ipsec_spd_type;
- ')
-
- allow $1 ipsec_spd_type:association setcontext;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_setcontext_all_spds'($*)) dnl
- ')
-
-
-########################################
-##
-## Send generic client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_send_generic_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_generic_client_packets'($*)) dnl
-
- gen_require(`
- type client_packet_t;
- ')
-
- allow $1 client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_generic_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive generic client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_receive_generic_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_generic_client_packets'($*)) dnl
-
- gen_require(`
- type client_packet_t;
- ')
-
- allow $1 client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_generic_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive generic client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_sendrecv_generic_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_generic_client_packets'($*)) dnl
-
- corenet_send_generic_client_packets($1)
- corenet_receive_generic_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_generic_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to the generic client packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_generic_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_generic_client_packets'($*)) dnl
-
- gen_require(`
- type client_packet_t;
- ')
-
- allow $1 client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_generic_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send generic server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_send_generic_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_generic_server_packets'($*)) dnl
-
- gen_require(`
- type server_packet_t;
- ')
-
- allow $1 server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_generic_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive generic server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_receive_generic_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_generic_server_packets'($*)) dnl
-
- gen_require(`
- type server_packet_t;
- ')
-
- allow $1 server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_generic_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive generic server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_sendrecv_generic_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_generic_server_packets'($*)) dnl
-
- corenet_send_generic_server_packets($1)
- corenet_receive_generic_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_generic_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to the generic server packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_generic_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_generic_server_packets'($*)) dnl
-
- gen_require(`
- type server_packet_t;
- ')
-
- allow $1 server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_generic_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive unlabeled packets.
-##
-##
-##
-## Send and receive unlabeled packets.
-## These packets do not match any netfilter
-## SECMARK rules.
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_sendrecv_unlabeled_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_unlabeled_packets'($*)) dnl
-
- kernel_sendrecv_unlabeled_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_unlabeled_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send all client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_send_all_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_all_client_packets'($*)) dnl
-
- gen_require(`
- attribute client_packet_type;
- ')
-
- allow $1 client_packet_type:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_all_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive all client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_receive_all_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_all_client_packets'($*)) dnl
-
- gen_require(`
- attribute client_packet_type;
- ')
-
- allow $1 client_packet_type:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_all_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive all client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_sendrecv_all_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_all_client_packets'($*)) dnl
-
- corenet_send_all_client_packets($1)
- corenet_receive_all_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_all_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to any client packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_all_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_all_client_packets'($*)) dnl
-
- gen_require(`
- attribute client_packet_type;
- ')
-
- allow $1 client_packet_type:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_all_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send all server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_send_all_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_all_server_packets'($*)) dnl
-
- gen_require(`
- attribute server_packet_type;
- ')
-
- allow $1 server_packet_type:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_all_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive SCTP packets from a NetLabel connection.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_sctp_recvfrom_netlabel',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sctp_recvfrom_netlabel'($*)) dnl
-
- gen_require(`
- type netlabel_peer_t;
- ')
-
- allow $1 netlabel_peer_t:peer recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sctp_recvfrom_netlabel'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive all server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_receive_all_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_all_server_packets'($*)) dnl
-
- gen_require(`
- attribute server_packet_type;
- ')
-
- allow $1 server_packet_type:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_all_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive all server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_sendrecv_all_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_all_server_packets'($*)) dnl
-
- corenet_send_all_server_packets($1)
- corenet_receive_all_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_all_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to any server packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_all_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_all_server_packets'($*)) dnl
-
- gen_require(`
- attribute server_packet_type;
- ')
-
- allow $1 server_packet_type:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_all_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive SCTP packets from an unlabled connection.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_sctp_recvfrom_unlabeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sctp_recvfrom_unlabeled'($*)) dnl
-
- gen_require(`
- attribute corenet_unlabeled_type;
- ')
-
- kernel_recvfrom_unlabeled_peer($1)
-
- typeattribute $1 corenet_unlabeled_type;
- kernel_sendrecv_unlabeled_association($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sctp_recvfrom_unlabeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Send all packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_send_all_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_all_packets'($*)) dnl
-
- gen_require(`
- attribute packet_type;
- ')
-
- allow $1 packet_type:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_all_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive all packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_receive_all_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_all_packets'($*)) dnl
-
- gen_require(`
- attribute packet_type;
- ')
-
- allow $1 packet_type:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_all_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive all packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_sendrecv_all_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_all_packets'($*)) dnl
-
- corenet_send_all_packets($1)
- corenet_receive_all_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_all_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to any packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_all_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_all_packets'($*)) dnl
-
- gen_require(`
- attribute packet_type;
- ')
-
- allow $1 packet_type:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_all_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Access unlabeled infiniband pkeys.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_ib_access_unlabeled_pkeys',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_ib_access_unlabeled_pkeys'($*)) dnl
-
- kernel_ib_access_unlabeled_pkeys($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_ib_access_unlabeled_pkeys'($*)) dnl
- ')
-
-
-########################################
-##
-## Access all labeled infiniband pkeys.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_ib_access_all_pkeys',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_ib_access_all_pkeys'($*)) dnl
-
- gen_require(`
- attribute ibpkey_type;
- ')
-
- allow $1 ibpkey_type:infiniband_pkey access;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_ib_access_all_pkeys'($*)) dnl
- ')
-
-
-########################################
-##
-## Manage subnets on all labeled Infiniband endports
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_ib_manage_subnet_all_endports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_ib_manage_subnet_all_endports'($*)) dnl
-
- gen_require(`
- attribute ibendport_type;
- ')
-
- allow $1 ibendport_type:infiniband_endport manage_subnet;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_ib_manage_subnet_all_endports'($*)) dnl
- ')
-
-
-########################################
-##
-## Manage subnet on all unlabeled Infiniband endports
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_ib_manage_subnet_unlabeled_endports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_ib_manage_subnet_unlabeled_endports'($*)) dnl
-
- kernel_ib_manage_subnet_unlabeled_endports($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_ib_manage_subnet_unlabeled_endports'($*)) dnl
- ')
-
-
-########################################
-##
-## Rules for receiving labeled SCTP packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Peer domain.
-##
-##
-#
- define(`corenet_sctp_recvfrom_labeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sctp_recvfrom_labeled'($*)) dnl
-
- allow { $1 $2 } self:association sendto;
- allow $1 $2:association recvfrom;
- allow $2 $1:association recvfrom;
-
- allow $1 $2:peer recv;
- allow $2 $1:peer recv;
-
- # allow receiving packets from MLS-only peers using NetLabel
- corenet_sctp_recvfrom_netlabel($1)
- corenet_sctp_recvfrom_netlabel($2)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sctp_recvfrom_labeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Unconfined access to network objects.
-##
-##
-##
-## The domain allowed access.
-##
-##
-#
- define(`corenet_unconfined',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_unconfined'($*)) dnl
-
- gen_require(`
- attribute corenet_unconfined_type;
- ')
-
- typeattribute $1 corenet_unconfined_type;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_unconfined'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the adb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_adb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_adb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_adb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the adb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_adb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_adb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_adb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the adb port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_adb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_adb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_adb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the adb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_adb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_adb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_adb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the adb port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_adb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_adb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_adb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the adb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_adb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_adb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_adb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the adb port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_adb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_adb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_adb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the adb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_adb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_adb_port'($*)) dnl
-
- gen_require(`
- type adb_port_t;
- ')
-
- allow $1 adb_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_adb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the adb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_adb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_adb_port'($*)) dnl
-
- gen_require(`
- type adb_port_t;
- ')
-
- allow $1 adb_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_adb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the adb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_adb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_adb_port'($*)) dnl
-
- gen_require(`
- type adb_port_t;
- ')
-
- allow $1 adb_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_adb_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send adb_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_adb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_adb_client_packets'($*)) dnl
-
- gen_require(`
- type adb_client_packet_t;
- ')
-
- allow $1 adb_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_adb_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send adb_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_adb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_adb_client_packets'($*)) dnl
-
- gen_require(`
- type adb_client_packet_t;
- ')
-
- dontaudit $1 adb_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_adb_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive adb_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_adb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_adb_client_packets'($*)) dnl
-
- gen_require(`
- type adb_client_packet_t;
- ')
-
- allow $1 adb_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_adb_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive adb_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_adb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_adb_client_packets'($*)) dnl
-
- gen_require(`
- type adb_client_packet_t;
- ')
-
- dontaudit $1 adb_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_adb_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive adb_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_adb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_adb_client_packets'($*)) dnl
-
- corenet_send_adb_client_packets($1)
- corenet_receive_adb_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_adb_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive adb_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_adb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_adb_client_packets'($*)) dnl
-
- corenet_dontaudit_send_adb_client_packets($1)
- corenet_dontaudit_receive_adb_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_adb_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to adb_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_adb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_adb_client_packets'($*)) dnl
-
- gen_require(`
- type adb_client_packet_t;
- ')
-
- allow $1 adb_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_adb_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send adb_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_adb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_adb_server_packets'($*)) dnl
-
- gen_require(`
- type adb_server_packet_t;
- ')
-
- allow $1 adb_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_adb_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send adb_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_adb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_adb_server_packets'($*)) dnl
-
- gen_require(`
- type adb_server_packet_t;
- ')
-
- dontaudit $1 adb_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_adb_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive adb_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_adb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_adb_server_packets'($*)) dnl
-
- gen_require(`
- type adb_server_packet_t;
- ')
-
- allow $1 adb_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_adb_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive adb_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_adb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_adb_server_packets'($*)) dnl
-
- gen_require(`
- type adb_server_packet_t;
- ')
-
- dontaudit $1 adb_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_adb_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive adb_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_adb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_adb_server_packets'($*)) dnl
-
- corenet_send_adb_server_packets($1)
- corenet_receive_adb_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_adb_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive adb_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_adb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_adb_server_packets'($*)) dnl
-
- corenet_dontaudit_send_adb_server_packets($1)
- corenet_dontaudit_receive_adb_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_adb_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to adb_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_adb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_adb_server_packets'($*)) dnl
-
- gen_require(`
- type adb_server_packet_t;
- ')
-
- allow $1 adb_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_adb_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the afs_bos port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_afs_bos_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_afs_bos_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_afs_bos_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the afs_bos port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_afs_bos_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_afs_bos_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_afs_bos_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the afs_bos port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_afs_bos_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_afs_bos_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_afs_bos_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the afs_bos port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_afs_bos_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_afs_bos_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_afs_bos_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the afs_bos port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_afs_bos_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_afs_bos_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_afs_bos_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the afs_bos port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_afs_bos_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_afs_bos_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_afs_bos_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the afs_bos port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_afs_bos_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_afs_bos_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_afs_bos_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the afs_bos port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_afs_bos_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_afs_bos_port'($*)) dnl
-
- gen_require(`
- type afs_bos_port_t;
- ')
-
- allow $1 afs_bos_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_afs_bos_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the afs_bos port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_afs_bos_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_afs_bos_port'($*)) dnl
-
- gen_require(`
- type afs_bos_port_t;
- ')
-
- allow $1 afs_bos_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_afs_bos_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the afs_bos port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_afs_bos_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_afs_bos_port'($*)) dnl
-
- gen_require(`
- type afs_bos_port_t;
- ')
-
- allow $1 afs_bos_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_afs_bos_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send afs_bos_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_afs_bos_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_afs_bos_client_packets'($*)) dnl
-
- gen_require(`
- type afs_bos_client_packet_t;
- ')
-
- allow $1 afs_bos_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_afs_bos_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send afs_bos_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_afs_bos_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_afs_bos_client_packets'($*)) dnl
-
- gen_require(`
- type afs_bos_client_packet_t;
- ')
-
- dontaudit $1 afs_bos_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_afs_bos_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive afs_bos_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_afs_bos_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_afs_bos_client_packets'($*)) dnl
-
- gen_require(`
- type afs_bos_client_packet_t;
- ')
-
- allow $1 afs_bos_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_afs_bos_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive afs_bos_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_afs_bos_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_afs_bos_client_packets'($*)) dnl
-
- gen_require(`
- type afs_bos_client_packet_t;
- ')
-
- dontaudit $1 afs_bos_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_afs_bos_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive afs_bos_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_afs_bos_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_afs_bos_client_packets'($*)) dnl
-
- corenet_send_afs_bos_client_packets($1)
- corenet_receive_afs_bos_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_afs_bos_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive afs_bos_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_afs_bos_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_afs_bos_client_packets'($*)) dnl
-
- corenet_dontaudit_send_afs_bos_client_packets($1)
- corenet_dontaudit_receive_afs_bos_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_afs_bos_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to afs_bos_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_afs_bos_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_afs_bos_client_packets'($*)) dnl
-
- gen_require(`
- type afs_bos_client_packet_t;
- ')
-
- allow $1 afs_bos_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_afs_bos_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send afs_bos_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_afs_bos_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_afs_bos_server_packets'($*)) dnl
-
- gen_require(`
- type afs_bos_server_packet_t;
- ')
-
- allow $1 afs_bos_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_afs_bos_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send afs_bos_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_afs_bos_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_afs_bos_server_packets'($*)) dnl
-
- gen_require(`
- type afs_bos_server_packet_t;
- ')
-
- dontaudit $1 afs_bos_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_afs_bos_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive afs_bos_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_afs_bos_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_afs_bos_server_packets'($*)) dnl
-
- gen_require(`
- type afs_bos_server_packet_t;
- ')
-
- allow $1 afs_bos_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_afs_bos_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive afs_bos_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_afs_bos_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_afs_bos_server_packets'($*)) dnl
-
- gen_require(`
- type afs_bos_server_packet_t;
- ')
-
- dontaudit $1 afs_bos_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_afs_bos_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive afs_bos_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_afs_bos_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_afs_bos_server_packets'($*)) dnl
-
- corenet_send_afs_bos_server_packets($1)
- corenet_receive_afs_bos_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_afs_bos_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive afs_bos_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_afs_bos_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_afs_bos_server_packets'($*)) dnl
-
- corenet_dontaudit_send_afs_bos_server_packets($1)
- corenet_dontaudit_receive_afs_bos_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_afs_bos_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to afs_bos_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_afs_bos_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_afs_bos_server_packets'($*)) dnl
-
- gen_require(`
- type afs_bos_server_packet_t;
- ')
-
- allow $1 afs_bos_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_afs_bos_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the afs_fs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_afs_fs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_afs_fs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_afs_fs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the afs_fs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_afs_fs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_afs_fs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_afs_fs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the afs_fs port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_afs_fs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_afs_fs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_afs_fs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the afs_fs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_afs_fs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_afs_fs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_afs_fs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the afs_fs port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_afs_fs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_afs_fs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_afs_fs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the afs_fs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_afs_fs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_afs_fs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_afs_fs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the afs_fs port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_afs_fs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_afs_fs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_afs_fs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the afs_fs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_afs_fs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_afs_fs_port'($*)) dnl
-
- gen_require(`
- type afs_fs_port_t;
- ')
-
- allow $1 afs_fs_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_afs_fs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the afs_fs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_afs_fs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_afs_fs_port'($*)) dnl
-
- gen_require(`
- type afs_fs_port_t;
- ')
-
- allow $1 afs_fs_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_afs_fs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the afs_fs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_afs_fs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_afs_fs_port'($*)) dnl
-
- gen_require(`
- type afs_fs_port_t;
- ')
-
- allow $1 afs_fs_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_afs_fs_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send afs_fs_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_afs_fs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_afs_fs_client_packets'($*)) dnl
-
- gen_require(`
- type afs_fs_client_packet_t;
- ')
-
- allow $1 afs_fs_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_afs_fs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send afs_fs_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_afs_fs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_afs_fs_client_packets'($*)) dnl
-
- gen_require(`
- type afs_fs_client_packet_t;
- ')
-
- dontaudit $1 afs_fs_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_afs_fs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive afs_fs_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_afs_fs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_afs_fs_client_packets'($*)) dnl
-
- gen_require(`
- type afs_fs_client_packet_t;
- ')
-
- allow $1 afs_fs_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_afs_fs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive afs_fs_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_afs_fs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_afs_fs_client_packets'($*)) dnl
-
- gen_require(`
- type afs_fs_client_packet_t;
- ')
-
- dontaudit $1 afs_fs_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_afs_fs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive afs_fs_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_afs_fs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_afs_fs_client_packets'($*)) dnl
-
- corenet_send_afs_fs_client_packets($1)
- corenet_receive_afs_fs_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_afs_fs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive afs_fs_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_afs_fs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_afs_fs_client_packets'($*)) dnl
-
- corenet_dontaudit_send_afs_fs_client_packets($1)
- corenet_dontaudit_receive_afs_fs_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_afs_fs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to afs_fs_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_afs_fs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_afs_fs_client_packets'($*)) dnl
-
- gen_require(`
- type afs_fs_client_packet_t;
- ')
-
- allow $1 afs_fs_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_afs_fs_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send afs_fs_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_afs_fs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_afs_fs_server_packets'($*)) dnl
-
- gen_require(`
- type afs_fs_server_packet_t;
- ')
-
- allow $1 afs_fs_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_afs_fs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send afs_fs_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_afs_fs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_afs_fs_server_packets'($*)) dnl
-
- gen_require(`
- type afs_fs_server_packet_t;
- ')
-
- dontaudit $1 afs_fs_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_afs_fs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive afs_fs_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_afs_fs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_afs_fs_server_packets'($*)) dnl
-
- gen_require(`
- type afs_fs_server_packet_t;
- ')
-
- allow $1 afs_fs_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_afs_fs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive afs_fs_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_afs_fs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_afs_fs_server_packets'($*)) dnl
-
- gen_require(`
- type afs_fs_server_packet_t;
- ')
-
- dontaudit $1 afs_fs_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_afs_fs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive afs_fs_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_afs_fs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_afs_fs_server_packets'($*)) dnl
-
- corenet_send_afs_fs_server_packets($1)
- corenet_receive_afs_fs_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_afs_fs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive afs_fs_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_afs_fs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_afs_fs_server_packets'($*)) dnl
-
- corenet_dontaudit_send_afs_fs_server_packets($1)
- corenet_dontaudit_receive_afs_fs_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_afs_fs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to afs_fs_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_afs_fs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_afs_fs_server_packets'($*)) dnl
-
- gen_require(`
- type afs_fs_server_packet_t;
- ')
-
- allow $1 afs_fs_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_afs_fs_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the afs_ka port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_afs_ka_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_afs_ka_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_afs_ka_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the afs_ka port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_afs_ka_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_afs_ka_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_afs_ka_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the afs_ka port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_afs_ka_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_afs_ka_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_afs_ka_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the afs_ka port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_afs_ka_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_afs_ka_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_afs_ka_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the afs_ka port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_afs_ka_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_afs_ka_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_afs_ka_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the afs_ka port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_afs_ka_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_afs_ka_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_afs_ka_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the afs_ka port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_afs_ka_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_afs_ka_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_afs_ka_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the afs_ka port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_afs_ka_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_afs_ka_port'($*)) dnl
-
- gen_require(`
- type afs_ka_port_t;
- ')
-
- allow $1 afs_ka_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_afs_ka_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the afs_ka port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_afs_ka_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_afs_ka_port'($*)) dnl
-
- gen_require(`
- type afs_ka_port_t;
- ')
-
- allow $1 afs_ka_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_afs_ka_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the afs_ka port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_afs_ka_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_afs_ka_port'($*)) dnl
-
- gen_require(`
- type afs_ka_port_t;
- ')
-
- allow $1 afs_ka_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_afs_ka_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send afs_ka_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_afs_ka_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_afs_ka_client_packets'($*)) dnl
-
- gen_require(`
- type afs_ka_client_packet_t;
- ')
-
- allow $1 afs_ka_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_afs_ka_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send afs_ka_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_afs_ka_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_afs_ka_client_packets'($*)) dnl
-
- gen_require(`
- type afs_ka_client_packet_t;
- ')
-
- dontaudit $1 afs_ka_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_afs_ka_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive afs_ka_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_afs_ka_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_afs_ka_client_packets'($*)) dnl
-
- gen_require(`
- type afs_ka_client_packet_t;
- ')
-
- allow $1 afs_ka_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_afs_ka_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive afs_ka_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_afs_ka_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_afs_ka_client_packets'($*)) dnl
-
- gen_require(`
- type afs_ka_client_packet_t;
- ')
-
- dontaudit $1 afs_ka_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_afs_ka_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive afs_ka_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_afs_ka_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_afs_ka_client_packets'($*)) dnl
-
- corenet_send_afs_ka_client_packets($1)
- corenet_receive_afs_ka_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_afs_ka_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive afs_ka_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_afs_ka_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_afs_ka_client_packets'($*)) dnl
-
- corenet_dontaudit_send_afs_ka_client_packets($1)
- corenet_dontaudit_receive_afs_ka_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_afs_ka_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to afs_ka_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_afs_ka_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_afs_ka_client_packets'($*)) dnl
-
- gen_require(`
- type afs_ka_client_packet_t;
- ')
-
- allow $1 afs_ka_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_afs_ka_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send afs_ka_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_afs_ka_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_afs_ka_server_packets'($*)) dnl
-
- gen_require(`
- type afs_ka_server_packet_t;
- ')
-
- allow $1 afs_ka_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_afs_ka_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send afs_ka_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_afs_ka_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_afs_ka_server_packets'($*)) dnl
-
- gen_require(`
- type afs_ka_server_packet_t;
- ')
-
- dontaudit $1 afs_ka_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_afs_ka_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive afs_ka_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_afs_ka_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_afs_ka_server_packets'($*)) dnl
-
- gen_require(`
- type afs_ka_server_packet_t;
- ')
-
- allow $1 afs_ka_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_afs_ka_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive afs_ka_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_afs_ka_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_afs_ka_server_packets'($*)) dnl
-
- gen_require(`
- type afs_ka_server_packet_t;
- ')
-
- dontaudit $1 afs_ka_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_afs_ka_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive afs_ka_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_afs_ka_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_afs_ka_server_packets'($*)) dnl
-
- corenet_send_afs_ka_server_packets($1)
- corenet_receive_afs_ka_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_afs_ka_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive afs_ka_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_afs_ka_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_afs_ka_server_packets'($*)) dnl
-
- corenet_dontaudit_send_afs_ka_server_packets($1)
- corenet_dontaudit_receive_afs_ka_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_afs_ka_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to afs_ka_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_afs_ka_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_afs_ka_server_packets'($*)) dnl
-
- gen_require(`
- type afs_ka_server_packet_t;
- ')
-
- allow $1 afs_ka_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_afs_ka_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the afs_pt port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_afs_pt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_afs_pt_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_afs_pt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the afs_pt port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_afs_pt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_afs_pt_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_afs_pt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the afs_pt port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_afs_pt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_afs_pt_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_afs_pt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the afs_pt port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_afs_pt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_afs_pt_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_afs_pt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the afs_pt port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_afs_pt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_afs_pt_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_afs_pt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the afs_pt port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_afs_pt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_afs_pt_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_afs_pt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the afs_pt port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_afs_pt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_afs_pt_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_afs_pt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the afs_pt port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_afs_pt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_afs_pt_port'($*)) dnl
-
- gen_require(`
- type afs_pt_port_t;
- ')
-
- allow $1 afs_pt_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_afs_pt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the afs_pt port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_afs_pt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_afs_pt_port'($*)) dnl
-
- gen_require(`
- type afs_pt_port_t;
- ')
-
- allow $1 afs_pt_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_afs_pt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the afs_pt port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_afs_pt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_afs_pt_port'($*)) dnl
-
- gen_require(`
- type afs_pt_port_t;
- ')
-
- allow $1 afs_pt_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_afs_pt_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send afs_pt_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_afs_pt_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_afs_pt_client_packets'($*)) dnl
-
- gen_require(`
- type afs_pt_client_packet_t;
- ')
-
- allow $1 afs_pt_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_afs_pt_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send afs_pt_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_afs_pt_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_afs_pt_client_packets'($*)) dnl
-
- gen_require(`
- type afs_pt_client_packet_t;
- ')
-
- dontaudit $1 afs_pt_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_afs_pt_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive afs_pt_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_afs_pt_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_afs_pt_client_packets'($*)) dnl
-
- gen_require(`
- type afs_pt_client_packet_t;
- ')
-
- allow $1 afs_pt_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_afs_pt_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive afs_pt_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_afs_pt_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_afs_pt_client_packets'($*)) dnl
-
- gen_require(`
- type afs_pt_client_packet_t;
- ')
-
- dontaudit $1 afs_pt_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_afs_pt_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive afs_pt_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_afs_pt_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_afs_pt_client_packets'($*)) dnl
-
- corenet_send_afs_pt_client_packets($1)
- corenet_receive_afs_pt_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_afs_pt_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive afs_pt_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_afs_pt_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_afs_pt_client_packets'($*)) dnl
-
- corenet_dontaudit_send_afs_pt_client_packets($1)
- corenet_dontaudit_receive_afs_pt_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_afs_pt_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to afs_pt_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_afs_pt_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_afs_pt_client_packets'($*)) dnl
-
- gen_require(`
- type afs_pt_client_packet_t;
- ')
-
- allow $1 afs_pt_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_afs_pt_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send afs_pt_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_afs_pt_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_afs_pt_server_packets'($*)) dnl
-
- gen_require(`
- type afs_pt_server_packet_t;
- ')
-
- allow $1 afs_pt_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_afs_pt_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send afs_pt_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_afs_pt_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_afs_pt_server_packets'($*)) dnl
-
- gen_require(`
- type afs_pt_server_packet_t;
- ')
-
- dontaudit $1 afs_pt_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_afs_pt_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive afs_pt_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_afs_pt_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_afs_pt_server_packets'($*)) dnl
-
- gen_require(`
- type afs_pt_server_packet_t;
- ')
-
- allow $1 afs_pt_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_afs_pt_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive afs_pt_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_afs_pt_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_afs_pt_server_packets'($*)) dnl
-
- gen_require(`
- type afs_pt_server_packet_t;
- ')
-
- dontaudit $1 afs_pt_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_afs_pt_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive afs_pt_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_afs_pt_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_afs_pt_server_packets'($*)) dnl
-
- corenet_send_afs_pt_server_packets($1)
- corenet_receive_afs_pt_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_afs_pt_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive afs_pt_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_afs_pt_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_afs_pt_server_packets'($*)) dnl
-
- corenet_dontaudit_send_afs_pt_server_packets($1)
- corenet_dontaudit_receive_afs_pt_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_afs_pt_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to afs_pt_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_afs_pt_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_afs_pt_server_packets'($*)) dnl
-
- gen_require(`
- type afs_pt_server_packet_t;
- ')
-
- allow $1 afs_pt_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_afs_pt_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the afs_vl port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_afs_vl_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_afs_vl_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_afs_vl_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the afs_vl port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_afs_vl_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_afs_vl_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_afs_vl_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the afs_vl port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_afs_vl_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_afs_vl_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_afs_vl_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the afs_vl port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_afs_vl_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_afs_vl_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_afs_vl_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the afs_vl port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_afs_vl_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_afs_vl_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_afs_vl_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the afs_vl port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_afs_vl_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_afs_vl_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_afs_vl_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the afs_vl port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_afs_vl_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_afs_vl_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_afs_vl_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the afs_vl port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_afs_vl_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_afs_vl_port'($*)) dnl
-
- gen_require(`
- type afs_vl_port_t;
- ')
-
- allow $1 afs_vl_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_afs_vl_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the afs_vl port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_afs_vl_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_afs_vl_port'($*)) dnl
-
- gen_require(`
- type afs_vl_port_t;
- ')
-
- allow $1 afs_vl_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_afs_vl_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the afs_vl port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_afs_vl_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_afs_vl_port'($*)) dnl
-
- gen_require(`
- type afs_vl_port_t;
- ')
-
- allow $1 afs_vl_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_afs_vl_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send afs_vl_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_afs_vl_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_afs_vl_client_packets'($*)) dnl
-
- gen_require(`
- type afs_vl_client_packet_t;
- ')
-
- allow $1 afs_vl_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_afs_vl_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send afs_vl_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_afs_vl_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_afs_vl_client_packets'($*)) dnl
-
- gen_require(`
- type afs_vl_client_packet_t;
- ')
-
- dontaudit $1 afs_vl_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_afs_vl_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive afs_vl_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_afs_vl_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_afs_vl_client_packets'($*)) dnl
-
- gen_require(`
- type afs_vl_client_packet_t;
- ')
-
- allow $1 afs_vl_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_afs_vl_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive afs_vl_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_afs_vl_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_afs_vl_client_packets'($*)) dnl
-
- gen_require(`
- type afs_vl_client_packet_t;
- ')
-
- dontaudit $1 afs_vl_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_afs_vl_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive afs_vl_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_afs_vl_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_afs_vl_client_packets'($*)) dnl
-
- corenet_send_afs_vl_client_packets($1)
- corenet_receive_afs_vl_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_afs_vl_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive afs_vl_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_afs_vl_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_afs_vl_client_packets'($*)) dnl
-
- corenet_dontaudit_send_afs_vl_client_packets($1)
- corenet_dontaudit_receive_afs_vl_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_afs_vl_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to afs_vl_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_afs_vl_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_afs_vl_client_packets'($*)) dnl
-
- gen_require(`
- type afs_vl_client_packet_t;
- ')
-
- allow $1 afs_vl_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_afs_vl_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send afs_vl_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_afs_vl_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_afs_vl_server_packets'($*)) dnl
-
- gen_require(`
- type afs_vl_server_packet_t;
- ')
-
- allow $1 afs_vl_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_afs_vl_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send afs_vl_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_afs_vl_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_afs_vl_server_packets'($*)) dnl
-
- gen_require(`
- type afs_vl_server_packet_t;
- ')
-
- dontaudit $1 afs_vl_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_afs_vl_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive afs_vl_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_afs_vl_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_afs_vl_server_packets'($*)) dnl
-
- gen_require(`
- type afs_vl_server_packet_t;
- ')
-
- allow $1 afs_vl_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_afs_vl_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive afs_vl_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_afs_vl_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_afs_vl_server_packets'($*)) dnl
-
- gen_require(`
- type afs_vl_server_packet_t;
- ')
-
- dontaudit $1 afs_vl_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_afs_vl_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive afs_vl_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_afs_vl_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_afs_vl_server_packets'($*)) dnl
-
- corenet_send_afs_vl_server_packets($1)
- corenet_receive_afs_vl_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_afs_vl_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive afs_vl_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_afs_vl_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_afs_vl_server_packets'($*)) dnl
-
- corenet_dontaudit_send_afs_vl_server_packets($1)
- corenet_dontaudit_receive_afs_vl_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_afs_vl_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to afs_vl_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_afs_vl_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_afs_vl_server_packets'($*)) dnl
-
- gen_require(`
- type afs_vl_server_packet_t;
- ')
-
- allow $1 afs_vl_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_afs_vl_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the afs3_callback port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_afs3_callback_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_afs3_callback_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_afs3_callback_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the afs3_callback port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_afs3_callback_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_afs3_callback_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_afs3_callback_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the afs3_callback port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_afs3_callback_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_afs3_callback_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_afs3_callback_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the afs3_callback port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_afs3_callback_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_afs3_callback_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_afs3_callback_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the afs3_callback port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_afs3_callback_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_afs3_callback_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_afs3_callback_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the afs3_callback port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_afs3_callback_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_afs3_callback_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_afs3_callback_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the afs3_callback port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_afs3_callback_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_afs3_callback_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_afs3_callback_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the afs3_callback port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_afs3_callback_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_afs3_callback_port'($*)) dnl
-
- gen_require(`
- type afs3_callback_port_t;
- ')
-
- allow $1 afs3_callback_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_afs3_callback_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the afs3_callback port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_afs3_callback_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_afs3_callback_port'($*)) dnl
-
- gen_require(`
- type afs3_callback_port_t;
- ')
-
- allow $1 afs3_callback_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_afs3_callback_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the afs3_callback port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_afs3_callback_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_afs3_callback_port'($*)) dnl
-
- gen_require(`
- type afs3_callback_port_t;
- ')
-
- allow $1 afs3_callback_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_afs3_callback_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send afs3_callback_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_afs3_callback_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_afs3_callback_client_packets'($*)) dnl
-
- gen_require(`
- type afs3_callback_client_packet_t;
- ')
-
- allow $1 afs3_callback_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_afs3_callback_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send afs3_callback_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_afs3_callback_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_afs3_callback_client_packets'($*)) dnl
-
- gen_require(`
- type afs3_callback_client_packet_t;
- ')
-
- dontaudit $1 afs3_callback_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_afs3_callback_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive afs3_callback_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_afs3_callback_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_afs3_callback_client_packets'($*)) dnl
-
- gen_require(`
- type afs3_callback_client_packet_t;
- ')
-
- allow $1 afs3_callback_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_afs3_callback_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive afs3_callback_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_afs3_callback_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_afs3_callback_client_packets'($*)) dnl
-
- gen_require(`
- type afs3_callback_client_packet_t;
- ')
-
- dontaudit $1 afs3_callback_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_afs3_callback_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive afs3_callback_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_afs3_callback_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_afs3_callback_client_packets'($*)) dnl
-
- corenet_send_afs3_callback_client_packets($1)
- corenet_receive_afs3_callback_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_afs3_callback_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive afs3_callback_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_afs3_callback_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_afs3_callback_client_packets'($*)) dnl
-
- corenet_dontaudit_send_afs3_callback_client_packets($1)
- corenet_dontaudit_receive_afs3_callback_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_afs3_callback_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to afs3_callback_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_afs3_callback_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_afs3_callback_client_packets'($*)) dnl
-
- gen_require(`
- type afs3_callback_client_packet_t;
- ')
-
- allow $1 afs3_callback_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_afs3_callback_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send afs3_callback_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_afs3_callback_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_afs3_callback_server_packets'($*)) dnl
-
- gen_require(`
- type afs3_callback_server_packet_t;
- ')
-
- allow $1 afs3_callback_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_afs3_callback_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send afs3_callback_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_afs3_callback_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_afs3_callback_server_packets'($*)) dnl
-
- gen_require(`
- type afs3_callback_server_packet_t;
- ')
-
- dontaudit $1 afs3_callback_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_afs3_callback_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive afs3_callback_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_afs3_callback_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_afs3_callback_server_packets'($*)) dnl
-
- gen_require(`
- type afs3_callback_server_packet_t;
- ')
-
- allow $1 afs3_callback_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_afs3_callback_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive afs3_callback_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_afs3_callback_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_afs3_callback_server_packets'($*)) dnl
-
- gen_require(`
- type afs3_callback_server_packet_t;
- ')
-
- dontaudit $1 afs3_callback_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_afs3_callback_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive afs3_callback_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_afs3_callback_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_afs3_callback_server_packets'($*)) dnl
-
- corenet_send_afs3_callback_server_packets($1)
- corenet_receive_afs3_callback_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_afs3_callback_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive afs3_callback_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_afs3_callback_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_afs3_callback_server_packets'($*)) dnl
-
- corenet_dontaudit_send_afs3_callback_server_packets($1)
- corenet_dontaudit_receive_afs3_callback_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_afs3_callback_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to afs3_callback_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_afs3_callback_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_afs3_callback_server_packets'($*)) dnl
-
- gen_require(`
- type afs3_callback_server_packet_t;
- ')
-
- allow $1 afs3_callback_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_afs3_callback_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the agentx port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_agentx_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_agentx_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_agentx_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the agentx port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_agentx_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_agentx_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_agentx_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the agentx port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_agentx_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_agentx_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_agentx_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the agentx port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_agentx_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_agentx_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_agentx_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the agentx port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_agentx_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_agentx_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_agentx_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the agentx port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_agentx_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_agentx_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_agentx_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the agentx port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_agentx_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_agentx_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_agentx_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the agentx port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_agentx_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_agentx_port'($*)) dnl
-
- gen_require(`
- type agentx_port_t;
- ')
-
- allow $1 agentx_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_agentx_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the agentx port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_agentx_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_agentx_port'($*)) dnl
-
- gen_require(`
- type agentx_port_t;
- ')
-
- allow $1 agentx_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_agentx_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the agentx port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_agentx_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_agentx_port'($*)) dnl
-
- gen_require(`
- type agentx_port_t;
- ')
-
- allow $1 agentx_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_agentx_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send agentx_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_agentx_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_agentx_client_packets'($*)) dnl
-
- gen_require(`
- type agentx_client_packet_t;
- ')
-
- allow $1 agentx_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_agentx_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send agentx_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_agentx_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_agentx_client_packets'($*)) dnl
-
- gen_require(`
- type agentx_client_packet_t;
- ')
-
- dontaudit $1 agentx_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_agentx_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive agentx_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_agentx_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_agentx_client_packets'($*)) dnl
-
- gen_require(`
- type agentx_client_packet_t;
- ')
-
- allow $1 agentx_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_agentx_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive agentx_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_agentx_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_agentx_client_packets'($*)) dnl
-
- gen_require(`
- type agentx_client_packet_t;
- ')
-
- dontaudit $1 agentx_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_agentx_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive agentx_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_agentx_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_agentx_client_packets'($*)) dnl
-
- corenet_send_agentx_client_packets($1)
- corenet_receive_agentx_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_agentx_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive agentx_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_agentx_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_agentx_client_packets'($*)) dnl
-
- corenet_dontaudit_send_agentx_client_packets($1)
- corenet_dontaudit_receive_agentx_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_agentx_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to agentx_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_agentx_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_agentx_client_packets'($*)) dnl
-
- gen_require(`
- type agentx_client_packet_t;
- ')
-
- allow $1 agentx_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_agentx_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send agentx_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_agentx_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_agentx_server_packets'($*)) dnl
-
- gen_require(`
- type agentx_server_packet_t;
- ')
-
- allow $1 agentx_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_agentx_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send agentx_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_agentx_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_agentx_server_packets'($*)) dnl
-
- gen_require(`
- type agentx_server_packet_t;
- ')
-
- dontaudit $1 agentx_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_agentx_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive agentx_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_agentx_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_agentx_server_packets'($*)) dnl
-
- gen_require(`
- type agentx_server_packet_t;
- ')
-
- allow $1 agentx_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_agentx_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive agentx_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_agentx_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_agentx_server_packets'($*)) dnl
-
- gen_require(`
- type agentx_server_packet_t;
- ')
-
- dontaudit $1 agentx_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_agentx_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive agentx_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_agentx_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_agentx_server_packets'($*)) dnl
-
- corenet_send_agentx_server_packets($1)
- corenet_receive_agentx_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_agentx_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive agentx_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_agentx_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_agentx_server_packets'($*)) dnl
-
- corenet_dontaudit_send_agentx_server_packets($1)
- corenet_dontaudit_receive_agentx_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_agentx_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to agentx_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_agentx_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_agentx_server_packets'($*)) dnl
-
- gen_require(`
- type agentx_server_packet_t;
- ')
-
- allow $1 agentx_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_agentx_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the amanda port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_amanda_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_amanda_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_amanda_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the amanda port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_amanda_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_amanda_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_amanda_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the amanda port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_amanda_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_amanda_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_amanda_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the amanda port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_amanda_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_amanda_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_amanda_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the amanda port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_amanda_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_amanda_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_amanda_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the amanda port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_amanda_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_amanda_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_amanda_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the amanda port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_amanda_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_amanda_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_amanda_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the amanda port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_amanda_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_amanda_port'($*)) dnl
-
- gen_require(`
- type amanda_port_t;
- ')
-
- allow $1 amanda_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_amanda_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the amanda port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_amanda_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_amanda_port'($*)) dnl
-
- gen_require(`
- type amanda_port_t;
- ')
-
- allow $1 amanda_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_amanda_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the amanda port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_amanda_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_amanda_port'($*)) dnl
-
- gen_require(`
- type amanda_port_t;
- ')
-
- allow $1 amanda_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_amanda_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send amanda_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_amanda_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_amanda_client_packets'($*)) dnl
-
- gen_require(`
- type amanda_client_packet_t;
- ')
-
- allow $1 amanda_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_amanda_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send amanda_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_amanda_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_amanda_client_packets'($*)) dnl
-
- gen_require(`
- type amanda_client_packet_t;
- ')
-
- dontaudit $1 amanda_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_amanda_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive amanda_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_amanda_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_amanda_client_packets'($*)) dnl
-
- gen_require(`
- type amanda_client_packet_t;
- ')
-
- allow $1 amanda_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_amanda_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive amanda_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_amanda_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_amanda_client_packets'($*)) dnl
-
- gen_require(`
- type amanda_client_packet_t;
- ')
-
- dontaudit $1 amanda_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_amanda_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive amanda_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_amanda_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_amanda_client_packets'($*)) dnl
-
- corenet_send_amanda_client_packets($1)
- corenet_receive_amanda_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_amanda_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive amanda_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_amanda_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_amanda_client_packets'($*)) dnl
-
- corenet_dontaudit_send_amanda_client_packets($1)
- corenet_dontaudit_receive_amanda_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_amanda_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to amanda_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_amanda_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_amanda_client_packets'($*)) dnl
-
- gen_require(`
- type amanda_client_packet_t;
- ')
-
- allow $1 amanda_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_amanda_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send amanda_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_amanda_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_amanda_server_packets'($*)) dnl
-
- gen_require(`
- type amanda_server_packet_t;
- ')
-
- allow $1 amanda_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_amanda_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send amanda_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_amanda_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_amanda_server_packets'($*)) dnl
-
- gen_require(`
- type amanda_server_packet_t;
- ')
-
- dontaudit $1 amanda_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_amanda_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive amanda_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_amanda_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_amanda_server_packets'($*)) dnl
-
- gen_require(`
- type amanda_server_packet_t;
- ')
-
- allow $1 amanda_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_amanda_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive amanda_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_amanda_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_amanda_server_packets'($*)) dnl
-
- gen_require(`
- type amanda_server_packet_t;
- ')
-
- dontaudit $1 amanda_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_amanda_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive amanda_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_amanda_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_amanda_server_packets'($*)) dnl
-
- corenet_send_amanda_server_packets($1)
- corenet_receive_amanda_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_amanda_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive amanda_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_amanda_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_amanda_server_packets'($*)) dnl
-
- corenet_dontaudit_send_amanda_server_packets($1)
- corenet_dontaudit_receive_amanda_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_amanda_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to amanda_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_amanda_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_amanda_server_packets'($*)) dnl
-
- gen_require(`
- type amanda_server_packet_t;
- ')
-
- allow $1 amanda_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_amanda_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the amavisd_recv port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_amavisd_recv_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_amavisd_recv_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_amavisd_recv_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the amavisd_recv port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_amavisd_recv_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_amavisd_recv_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_amavisd_recv_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the amavisd_recv port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_amavisd_recv_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_amavisd_recv_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_amavisd_recv_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the amavisd_recv port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_amavisd_recv_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_amavisd_recv_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_amavisd_recv_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the amavisd_recv port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_amavisd_recv_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_amavisd_recv_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_amavisd_recv_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the amavisd_recv port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_amavisd_recv_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_amavisd_recv_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_amavisd_recv_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the amavisd_recv port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_amavisd_recv_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_amavisd_recv_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_amavisd_recv_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the amavisd_recv port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_amavisd_recv_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_amavisd_recv_port'($*)) dnl
-
- gen_require(`
- type amavisd_recv_port_t;
- ')
-
- allow $1 amavisd_recv_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_amavisd_recv_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the amavisd_recv port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_amavisd_recv_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_amavisd_recv_port'($*)) dnl
-
- gen_require(`
- type amavisd_recv_port_t;
- ')
-
- allow $1 amavisd_recv_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_amavisd_recv_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the amavisd_recv port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_amavisd_recv_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_amavisd_recv_port'($*)) dnl
-
- gen_require(`
- type amavisd_recv_port_t;
- ')
-
- allow $1 amavisd_recv_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_amavisd_recv_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send amavisd_recv_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_amavisd_recv_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_amavisd_recv_client_packets'($*)) dnl
-
- gen_require(`
- type amavisd_recv_client_packet_t;
- ')
-
- allow $1 amavisd_recv_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_amavisd_recv_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send amavisd_recv_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_amavisd_recv_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_amavisd_recv_client_packets'($*)) dnl
-
- gen_require(`
- type amavisd_recv_client_packet_t;
- ')
-
- dontaudit $1 amavisd_recv_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_amavisd_recv_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive amavisd_recv_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_amavisd_recv_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_amavisd_recv_client_packets'($*)) dnl
-
- gen_require(`
- type amavisd_recv_client_packet_t;
- ')
-
- allow $1 amavisd_recv_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_amavisd_recv_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive amavisd_recv_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_amavisd_recv_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_amavisd_recv_client_packets'($*)) dnl
-
- gen_require(`
- type amavisd_recv_client_packet_t;
- ')
-
- dontaudit $1 amavisd_recv_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_amavisd_recv_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive amavisd_recv_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_amavisd_recv_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_amavisd_recv_client_packets'($*)) dnl
-
- corenet_send_amavisd_recv_client_packets($1)
- corenet_receive_amavisd_recv_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_amavisd_recv_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive amavisd_recv_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_amavisd_recv_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_amavisd_recv_client_packets'($*)) dnl
-
- corenet_dontaudit_send_amavisd_recv_client_packets($1)
- corenet_dontaudit_receive_amavisd_recv_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_amavisd_recv_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to amavisd_recv_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_amavisd_recv_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_amavisd_recv_client_packets'($*)) dnl
-
- gen_require(`
- type amavisd_recv_client_packet_t;
- ')
-
- allow $1 amavisd_recv_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_amavisd_recv_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send amavisd_recv_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_amavisd_recv_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_amavisd_recv_server_packets'($*)) dnl
-
- gen_require(`
- type amavisd_recv_server_packet_t;
- ')
-
- allow $1 amavisd_recv_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_amavisd_recv_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send amavisd_recv_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_amavisd_recv_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_amavisd_recv_server_packets'($*)) dnl
-
- gen_require(`
- type amavisd_recv_server_packet_t;
- ')
-
- dontaudit $1 amavisd_recv_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_amavisd_recv_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive amavisd_recv_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_amavisd_recv_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_amavisd_recv_server_packets'($*)) dnl
-
- gen_require(`
- type amavisd_recv_server_packet_t;
- ')
-
- allow $1 amavisd_recv_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_amavisd_recv_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive amavisd_recv_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_amavisd_recv_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_amavisd_recv_server_packets'($*)) dnl
-
- gen_require(`
- type amavisd_recv_server_packet_t;
- ')
-
- dontaudit $1 amavisd_recv_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_amavisd_recv_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive amavisd_recv_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_amavisd_recv_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_amavisd_recv_server_packets'($*)) dnl
-
- corenet_send_amavisd_recv_server_packets($1)
- corenet_receive_amavisd_recv_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_amavisd_recv_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive amavisd_recv_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_amavisd_recv_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_amavisd_recv_server_packets'($*)) dnl
-
- corenet_dontaudit_send_amavisd_recv_server_packets($1)
- corenet_dontaudit_receive_amavisd_recv_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_amavisd_recv_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to amavisd_recv_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_amavisd_recv_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_amavisd_recv_server_packets'($*)) dnl
-
- gen_require(`
- type amavisd_recv_server_packet_t;
- ')
-
- allow $1 amavisd_recv_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_amavisd_recv_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the amavisd_send port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_amavisd_send_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_amavisd_send_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_amavisd_send_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the amavisd_send port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_amavisd_send_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_amavisd_send_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_amavisd_send_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the amavisd_send port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_amavisd_send_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_amavisd_send_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_amavisd_send_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the amavisd_send port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_amavisd_send_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_amavisd_send_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_amavisd_send_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the amavisd_send port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_amavisd_send_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_amavisd_send_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_amavisd_send_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the amavisd_send port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_amavisd_send_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_amavisd_send_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_amavisd_send_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the amavisd_send port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_amavisd_send_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_amavisd_send_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_amavisd_send_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the amavisd_send port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_amavisd_send_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_amavisd_send_port'($*)) dnl
-
- gen_require(`
- type amavisd_send_port_t;
- ')
-
- allow $1 amavisd_send_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_amavisd_send_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the amavisd_send port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_amavisd_send_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_amavisd_send_port'($*)) dnl
-
- gen_require(`
- type amavisd_send_port_t;
- ')
-
- allow $1 amavisd_send_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_amavisd_send_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the amavisd_send port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_amavisd_send_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_amavisd_send_port'($*)) dnl
-
- gen_require(`
- type amavisd_send_port_t;
- ')
-
- allow $1 amavisd_send_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_amavisd_send_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send amavisd_send_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_amavisd_send_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_amavisd_send_client_packets'($*)) dnl
-
- gen_require(`
- type amavisd_send_client_packet_t;
- ')
-
- allow $1 amavisd_send_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_amavisd_send_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send amavisd_send_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_amavisd_send_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_amavisd_send_client_packets'($*)) dnl
-
- gen_require(`
- type amavisd_send_client_packet_t;
- ')
-
- dontaudit $1 amavisd_send_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_amavisd_send_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive amavisd_send_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_amavisd_send_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_amavisd_send_client_packets'($*)) dnl
-
- gen_require(`
- type amavisd_send_client_packet_t;
- ')
-
- allow $1 amavisd_send_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_amavisd_send_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive amavisd_send_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_amavisd_send_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_amavisd_send_client_packets'($*)) dnl
-
- gen_require(`
- type amavisd_send_client_packet_t;
- ')
-
- dontaudit $1 amavisd_send_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_amavisd_send_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive amavisd_send_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_amavisd_send_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_amavisd_send_client_packets'($*)) dnl
-
- corenet_send_amavisd_send_client_packets($1)
- corenet_receive_amavisd_send_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_amavisd_send_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive amavisd_send_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_amavisd_send_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_amavisd_send_client_packets'($*)) dnl
-
- corenet_dontaudit_send_amavisd_send_client_packets($1)
- corenet_dontaudit_receive_amavisd_send_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_amavisd_send_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to amavisd_send_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_amavisd_send_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_amavisd_send_client_packets'($*)) dnl
-
- gen_require(`
- type amavisd_send_client_packet_t;
- ')
-
- allow $1 amavisd_send_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_amavisd_send_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send amavisd_send_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_amavisd_send_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_amavisd_send_server_packets'($*)) dnl
-
- gen_require(`
- type amavisd_send_server_packet_t;
- ')
-
- allow $1 amavisd_send_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_amavisd_send_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send amavisd_send_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_amavisd_send_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_amavisd_send_server_packets'($*)) dnl
-
- gen_require(`
- type amavisd_send_server_packet_t;
- ')
-
- dontaudit $1 amavisd_send_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_amavisd_send_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive amavisd_send_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_amavisd_send_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_amavisd_send_server_packets'($*)) dnl
-
- gen_require(`
- type amavisd_send_server_packet_t;
- ')
-
- allow $1 amavisd_send_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_amavisd_send_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive amavisd_send_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_amavisd_send_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_amavisd_send_server_packets'($*)) dnl
-
- gen_require(`
- type amavisd_send_server_packet_t;
- ')
-
- dontaudit $1 amavisd_send_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_amavisd_send_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive amavisd_send_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_amavisd_send_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_amavisd_send_server_packets'($*)) dnl
-
- corenet_send_amavisd_send_server_packets($1)
- corenet_receive_amavisd_send_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_amavisd_send_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive amavisd_send_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_amavisd_send_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_amavisd_send_server_packets'($*)) dnl
-
- corenet_dontaudit_send_amavisd_send_server_packets($1)
- corenet_dontaudit_receive_amavisd_send_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_amavisd_send_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to amavisd_send_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_amavisd_send_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_amavisd_send_server_packets'($*)) dnl
-
- gen_require(`
- type amavisd_send_server_packet_t;
- ')
-
- allow $1 amavisd_send_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_amavisd_send_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the amqp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_amqp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_amqp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_amqp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the amqp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_amqp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_amqp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_amqp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the amqp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_amqp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_amqp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_amqp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the amqp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_amqp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_amqp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_amqp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the amqp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_amqp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_amqp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_amqp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the amqp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_amqp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_amqp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_amqp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the amqp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_amqp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_amqp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_amqp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the amqp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_amqp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_amqp_port'($*)) dnl
-
- gen_require(`
- type amqp_port_t;
- ')
-
- allow $1 amqp_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_amqp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the amqp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_amqp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_amqp_port'($*)) dnl
-
- gen_require(`
- type amqp_port_t;
- ')
-
- allow $1 amqp_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_amqp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the amqp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_amqp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_amqp_port'($*)) dnl
-
- gen_require(`
- type amqp_port_t;
- ')
-
- allow $1 amqp_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_amqp_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send amqp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_amqp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_amqp_client_packets'($*)) dnl
-
- gen_require(`
- type amqp_client_packet_t;
- ')
-
- allow $1 amqp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_amqp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send amqp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_amqp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_amqp_client_packets'($*)) dnl
-
- gen_require(`
- type amqp_client_packet_t;
- ')
-
- dontaudit $1 amqp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_amqp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive amqp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_amqp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_amqp_client_packets'($*)) dnl
-
- gen_require(`
- type amqp_client_packet_t;
- ')
-
- allow $1 amqp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_amqp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive amqp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_amqp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_amqp_client_packets'($*)) dnl
-
- gen_require(`
- type amqp_client_packet_t;
- ')
-
- dontaudit $1 amqp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_amqp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive amqp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_amqp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_amqp_client_packets'($*)) dnl
-
- corenet_send_amqp_client_packets($1)
- corenet_receive_amqp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_amqp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive amqp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_amqp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_amqp_client_packets'($*)) dnl
-
- corenet_dontaudit_send_amqp_client_packets($1)
- corenet_dontaudit_receive_amqp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_amqp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to amqp_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_amqp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_amqp_client_packets'($*)) dnl
-
- gen_require(`
- type amqp_client_packet_t;
- ')
-
- allow $1 amqp_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_amqp_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send amqp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_amqp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_amqp_server_packets'($*)) dnl
-
- gen_require(`
- type amqp_server_packet_t;
- ')
-
- allow $1 amqp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_amqp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send amqp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_amqp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_amqp_server_packets'($*)) dnl
-
- gen_require(`
- type amqp_server_packet_t;
- ')
-
- dontaudit $1 amqp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_amqp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive amqp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_amqp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_amqp_server_packets'($*)) dnl
-
- gen_require(`
- type amqp_server_packet_t;
- ')
-
- allow $1 amqp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_amqp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive amqp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_amqp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_amqp_server_packets'($*)) dnl
-
- gen_require(`
- type amqp_server_packet_t;
- ')
-
- dontaudit $1 amqp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_amqp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive amqp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_amqp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_amqp_server_packets'($*)) dnl
-
- corenet_send_amqp_server_packets($1)
- corenet_receive_amqp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_amqp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive amqp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_amqp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_amqp_server_packets'($*)) dnl
-
- corenet_dontaudit_send_amqp_server_packets($1)
- corenet_dontaudit_receive_amqp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_amqp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to amqp_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_amqp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_amqp_server_packets'($*)) dnl
-
- gen_require(`
- type amqp_server_packet_t;
- ')
-
- allow $1 amqp_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_amqp_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the aol port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_aol_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_aol_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_aol_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the aol port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_aol_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_aol_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_aol_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the aol port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_aol_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_aol_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_aol_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the aol port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_aol_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_aol_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_aol_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the aol port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_aol_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_aol_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_aol_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the aol port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_aol_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_aol_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_aol_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the aol port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_aol_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_aol_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_aol_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the aol port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_aol_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_aol_port'($*)) dnl
-
- gen_require(`
- type aol_port_t;
- ')
-
- allow $1 aol_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_aol_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the aol port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_aol_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_aol_port'($*)) dnl
-
- gen_require(`
- type aol_port_t;
- ')
-
- allow $1 aol_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_aol_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the aol port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_aol_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_aol_port'($*)) dnl
-
- gen_require(`
- type aol_port_t;
- ')
-
- allow $1 aol_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_aol_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send aol_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_aol_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_aol_client_packets'($*)) dnl
-
- gen_require(`
- type aol_client_packet_t;
- ')
-
- allow $1 aol_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_aol_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send aol_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_aol_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_aol_client_packets'($*)) dnl
-
- gen_require(`
- type aol_client_packet_t;
- ')
-
- dontaudit $1 aol_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_aol_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive aol_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_aol_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_aol_client_packets'($*)) dnl
-
- gen_require(`
- type aol_client_packet_t;
- ')
-
- allow $1 aol_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_aol_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive aol_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_aol_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_aol_client_packets'($*)) dnl
-
- gen_require(`
- type aol_client_packet_t;
- ')
-
- dontaudit $1 aol_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_aol_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive aol_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_aol_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_aol_client_packets'($*)) dnl
-
- corenet_send_aol_client_packets($1)
- corenet_receive_aol_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_aol_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive aol_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_aol_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_aol_client_packets'($*)) dnl
-
- corenet_dontaudit_send_aol_client_packets($1)
- corenet_dontaudit_receive_aol_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_aol_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to aol_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_aol_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_aol_client_packets'($*)) dnl
-
- gen_require(`
- type aol_client_packet_t;
- ')
-
- allow $1 aol_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_aol_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send aol_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_aol_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_aol_server_packets'($*)) dnl
-
- gen_require(`
- type aol_server_packet_t;
- ')
-
- allow $1 aol_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_aol_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send aol_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_aol_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_aol_server_packets'($*)) dnl
-
- gen_require(`
- type aol_server_packet_t;
- ')
-
- dontaudit $1 aol_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_aol_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive aol_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_aol_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_aol_server_packets'($*)) dnl
-
- gen_require(`
- type aol_server_packet_t;
- ')
-
- allow $1 aol_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_aol_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive aol_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_aol_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_aol_server_packets'($*)) dnl
-
- gen_require(`
- type aol_server_packet_t;
- ')
-
- dontaudit $1 aol_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_aol_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive aol_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_aol_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_aol_server_packets'($*)) dnl
-
- corenet_send_aol_server_packets($1)
- corenet_receive_aol_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_aol_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive aol_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_aol_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_aol_server_packets'($*)) dnl
-
- corenet_dontaudit_send_aol_server_packets($1)
- corenet_dontaudit_receive_aol_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_aol_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to aol_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_aol_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_aol_server_packets'($*)) dnl
-
- gen_require(`
- type aol_server_packet_t;
- ')
-
- allow $1 aol_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_aol_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the apcupsd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_apcupsd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_apcupsd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_apcupsd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the apcupsd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_apcupsd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_apcupsd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_apcupsd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the apcupsd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_apcupsd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_apcupsd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_apcupsd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the apcupsd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_apcupsd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_apcupsd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_apcupsd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the apcupsd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_apcupsd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_apcupsd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_apcupsd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the apcupsd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_apcupsd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_apcupsd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_apcupsd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the apcupsd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_apcupsd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_apcupsd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_apcupsd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the apcupsd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_apcupsd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_apcupsd_port'($*)) dnl
-
- gen_require(`
- type apcupsd_port_t;
- ')
-
- allow $1 apcupsd_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_apcupsd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the apcupsd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_apcupsd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_apcupsd_port'($*)) dnl
-
- gen_require(`
- type apcupsd_port_t;
- ')
-
- allow $1 apcupsd_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_apcupsd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the apcupsd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_apcupsd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_apcupsd_port'($*)) dnl
-
- gen_require(`
- type apcupsd_port_t;
- ')
-
- allow $1 apcupsd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_apcupsd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send apcupsd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_apcupsd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_apcupsd_client_packets'($*)) dnl
-
- gen_require(`
- type apcupsd_client_packet_t;
- ')
-
- allow $1 apcupsd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_apcupsd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send apcupsd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_apcupsd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_apcupsd_client_packets'($*)) dnl
-
- gen_require(`
- type apcupsd_client_packet_t;
- ')
-
- dontaudit $1 apcupsd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_apcupsd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive apcupsd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_apcupsd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_apcupsd_client_packets'($*)) dnl
-
- gen_require(`
- type apcupsd_client_packet_t;
- ')
-
- allow $1 apcupsd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_apcupsd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive apcupsd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_apcupsd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_apcupsd_client_packets'($*)) dnl
-
- gen_require(`
- type apcupsd_client_packet_t;
- ')
-
- dontaudit $1 apcupsd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_apcupsd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive apcupsd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_apcupsd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_apcupsd_client_packets'($*)) dnl
-
- corenet_send_apcupsd_client_packets($1)
- corenet_receive_apcupsd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_apcupsd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive apcupsd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_apcupsd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_apcupsd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_apcupsd_client_packets($1)
- corenet_dontaudit_receive_apcupsd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_apcupsd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to apcupsd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_apcupsd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_apcupsd_client_packets'($*)) dnl
-
- gen_require(`
- type apcupsd_client_packet_t;
- ')
-
- allow $1 apcupsd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_apcupsd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send apcupsd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_apcupsd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_apcupsd_server_packets'($*)) dnl
-
- gen_require(`
- type apcupsd_server_packet_t;
- ')
-
- allow $1 apcupsd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_apcupsd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send apcupsd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_apcupsd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_apcupsd_server_packets'($*)) dnl
-
- gen_require(`
- type apcupsd_server_packet_t;
- ')
-
- dontaudit $1 apcupsd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_apcupsd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive apcupsd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_apcupsd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_apcupsd_server_packets'($*)) dnl
-
- gen_require(`
- type apcupsd_server_packet_t;
- ')
-
- allow $1 apcupsd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_apcupsd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive apcupsd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_apcupsd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_apcupsd_server_packets'($*)) dnl
-
- gen_require(`
- type apcupsd_server_packet_t;
- ')
-
- dontaudit $1 apcupsd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_apcupsd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive apcupsd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_apcupsd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_apcupsd_server_packets'($*)) dnl
-
- corenet_send_apcupsd_server_packets($1)
- corenet_receive_apcupsd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_apcupsd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive apcupsd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_apcupsd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_apcupsd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_apcupsd_server_packets($1)
- corenet_dontaudit_receive_apcupsd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_apcupsd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to apcupsd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_apcupsd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_apcupsd_server_packets'($*)) dnl
-
- gen_require(`
- type apcupsd_server_packet_t;
- ')
-
- allow $1 apcupsd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_apcupsd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the apertus_ldp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_apertus_ldp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_apertus_ldp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_apertus_ldp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the apertus_ldp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_apertus_ldp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_apertus_ldp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_apertus_ldp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the apertus_ldp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_apertus_ldp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_apertus_ldp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_apertus_ldp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the apertus_ldp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_apertus_ldp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_apertus_ldp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_apertus_ldp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the apertus_ldp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_apertus_ldp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_apertus_ldp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_apertus_ldp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the apertus_ldp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_apertus_ldp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_apertus_ldp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_apertus_ldp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the apertus_ldp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_apertus_ldp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_apertus_ldp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_apertus_ldp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the apertus_ldp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_apertus_ldp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_apertus_ldp_port'($*)) dnl
-
- gen_require(`
- type apertus_ldp_port_t;
- ')
-
- allow $1 apertus_ldp_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_apertus_ldp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the apertus_ldp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_apertus_ldp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_apertus_ldp_port'($*)) dnl
-
- gen_require(`
- type apertus_ldp_port_t;
- ')
-
- allow $1 apertus_ldp_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_apertus_ldp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the apertus_ldp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_apertus_ldp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_apertus_ldp_port'($*)) dnl
-
- gen_require(`
- type apertus_ldp_port_t;
- ')
-
- allow $1 apertus_ldp_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_apertus_ldp_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send apertus_ldp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_apertus_ldp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_apertus_ldp_client_packets'($*)) dnl
-
- gen_require(`
- type apertus_ldp_client_packet_t;
- ')
-
- allow $1 apertus_ldp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_apertus_ldp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send apertus_ldp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_apertus_ldp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_apertus_ldp_client_packets'($*)) dnl
-
- gen_require(`
- type apertus_ldp_client_packet_t;
- ')
-
- dontaudit $1 apertus_ldp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_apertus_ldp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive apertus_ldp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_apertus_ldp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_apertus_ldp_client_packets'($*)) dnl
-
- gen_require(`
- type apertus_ldp_client_packet_t;
- ')
-
- allow $1 apertus_ldp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_apertus_ldp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive apertus_ldp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_apertus_ldp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_apertus_ldp_client_packets'($*)) dnl
-
- gen_require(`
- type apertus_ldp_client_packet_t;
- ')
-
- dontaudit $1 apertus_ldp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_apertus_ldp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive apertus_ldp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_apertus_ldp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_apertus_ldp_client_packets'($*)) dnl
-
- corenet_send_apertus_ldp_client_packets($1)
- corenet_receive_apertus_ldp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_apertus_ldp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive apertus_ldp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_apertus_ldp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_apertus_ldp_client_packets'($*)) dnl
-
- corenet_dontaudit_send_apertus_ldp_client_packets($1)
- corenet_dontaudit_receive_apertus_ldp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_apertus_ldp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to apertus_ldp_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_apertus_ldp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_apertus_ldp_client_packets'($*)) dnl
-
- gen_require(`
- type apertus_ldp_client_packet_t;
- ')
-
- allow $1 apertus_ldp_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_apertus_ldp_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send apertus_ldp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_apertus_ldp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_apertus_ldp_server_packets'($*)) dnl
-
- gen_require(`
- type apertus_ldp_server_packet_t;
- ')
-
- allow $1 apertus_ldp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_apertus_ldp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send apertus_ldp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_apertus_ldp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_apertus_ldp_server_packets'($*)) dnl
-
- gen_require(`
- type apertus_ldp_server_packet_t;
- ')
-
- dontaudit $1 apertus_ldp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_apertus_ldp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive apertus_ldp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_apertus_ldp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_apertus_ldp_server_packets'($*)) dnl
-
- gen_require(`
- type apertus_ldp_server_packet_t;
- ')
-
- allow $1 apertus_ldp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_apertus_ldp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive apertus_ldp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_apertus_ldp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_apertus_ldp_server_packets'($*)) dnl
-
- gen_require(`
- type apertus_ldp_server_packet_t;
- ')
-
- dontaudit $1 apertus_ldp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_apertus_ldp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive apertus_ldp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_apertus_ldp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_apertus_ldp_server_packets'($*)) dnl
-
- corenet_send_apertus_ldp_server_packets($1)
- corenet_receive_apertus_ldp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_apertus_ldp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive apertus_ldp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_apertus_ldp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_apertus_ldp_server_packets'($*)) dnl
-
- corenet_dontaudit_send_apertus_ldp_server_packets($1)
- corenet_dontaudit_receive_apertus_ldp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_apertus_ldp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to apertus_ldp_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_apertus_ldp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_apertus_ldp_server_packets'($*)) dnl
-
- gen_require(`
- type apertus_ldp_server_packet_t;
- ')
-
- allow $1 apertus_ldp_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_apertus_ldp_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the armtechdaemon port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_armtechdaemon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_armtechdaemon_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_armtechdaemon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the armtechdaemon port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_armtechdaemon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_armtechdaemon_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_armtechdaemon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the armtechdaemon port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_armtechdaemon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_armtechdaemon_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_armtechdaemon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the armtechdaemon port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_armtechdaemon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_armtechdaemon_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_armtechdaemon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the armtechdaemon port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_armtechdaemon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_armtechdaemon_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_armtechdaemon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the armtechdaemon port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_armtechdaemon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_armtechdaemon_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_armtechdaemon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the armtechdaemon port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_armtechdaemon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_armtechdaemon_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_armtechdaemon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the armtechdaemon port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_armtechdaemon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_armtechdaemon_port'($*)) dnl
-
- gen_require(`
- type armtechdaemon_port_t;
- ')
-
- allow $1 armtechdaemon_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_armtechdaemon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the armtechdaemon port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_armtechdaemon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_armtechdaemon_port'($*)) dnl
-
- gen_require(`
- type armtechdaemon_port_t;
- ')
-
- allow $1 armtechdaemon_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_armtechdaemon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the armtechdaemon port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_armtechdaemon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_armtechdaemon_port'($*)) dnl
-
- gen_require(`
- type armtechdaemon_port_t;
- ')
-
- allow $1 armtechdaemon_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_armtechdaemon_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send armtechdaemon_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_armtechdaemon_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_armtechdaemon_client_packets'($*)) dnl
-
- gen_require(`
- type armtechdaemon_client_packet_t;
- ')
-
- allow $1 armtechdaemon_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_armtechdaemon_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send armtechdaemon_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_armtechdaemon_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_armtechdaemon_client_packets'($*)) dnl
-
- gen_require(`
- type armtechdaemon_client_packet_t;
- ')
-
- dontaudit $1 armtechdaemon_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_armtechdaemon_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive armtechdaemon_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_armtechdaemon_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_armtechdaemon_client_packets'($*)) dnl
-
- gen_require(`
- type armtechdaemon_client_packet_t;
- ')
-
- allow $1 armtechdaemon_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_armtechdaemon_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive armtechdaemon_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_armtechdaemon_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_armtechdaemon_client_packets'($*)) dnl
-
- gen_require(`
- type armtechdaemon_client_packet_t;
- ')
-
- dontaudit $1 armtechdaemon_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_armtechdaemon_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive armtechdaemon_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_armtechdaemon_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_armtechdaemon_client_packets'($*)) dnl
-
- corenet_send_armtechdaemon_client_packets($1)
- corenet_receive_armtechdaemon_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_armtechdaemon_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive armtechdaemon_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_armtechdaemon_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_armtechdaemon_client_packets'($*)) dnl
-
- corenet_dontaudit_send_armtechdaemon_client_packets($1)
- corenet_dontaudit_receive_armtechdaemon_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_armtechdaemon_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to armtechdaemon_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_armtechdaemon_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_armtechdaemon_client_packets'($*)) dnl
-
- gen_require(`
- type armtechdaemon_client_packet_t;
- ')
-
- allow $1 armtechdaemon_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_armtechdaemon_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send armtechdaemon_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_armtechdaemon_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_armtechdaemon_server_packets'($*)) dnl
-
- gen_require(`
- type armtechdaemon_server_packet_t;
- ')
-
- allow $1 armtechdaemon_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_armtechdaemon_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send armtechdaemon_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_armtechdaemon_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_armtechdaemon_server_packets'($*)) dnl
-
- gen_require(`
- type armtechdaemon_server_packet_t;
- ')
-
- dontaudit $1 armtechdaemon_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_armtechdaemon_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive armtechdaemon_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_armtechdaemon_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_armtechdaemon_server_packets'($*)) dnl
-
- gen_require(`
- type armtechdaemon_server_packet_t;
- ')
-
- allow $1 armtechdaemon_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_armtechdaemon_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive armtechdaemon_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_armtechdaemon_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_armtechdaemon_server_packets'($*)) dnl
-
- gen_require(`
- type armtechdaemon_server_packet_t;
- ')
-
- dontaudit $1 armtechdaemon_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_armtechdaemon_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive armtechdaemon_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_armtechdaemon_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_armtechdaemon_server_packets'($*)) dnl
-
- corenet_send_armtechdaemon_server_packets($1)
- corenet_receive_armtechdaemon_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_armtechdaemon_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive armtechdaemon_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_armtechdaemon_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_armtechdaemon_server_packets'($*)) dnl
-
- corenet_dontaudit_send_armtechdaemon_server_packets($1)
- corenet_dontaudit_receive_armtechdaemon_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_armtechdaemon_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to armtechdaemon_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_armtechdaemon_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_armtechdaemon_server_packets'($*)) dnl
-
- gen_require(`
- type armtechdaemon_server_packet_t;
- ')
-
- allow $1 armtechdaemon_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_armtechdaemon_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the asterisk port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_asterisk_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_asterisk_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_asterisk_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the asterisk port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_asterisk_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_asterisk_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_asterisk_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the asterisk port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_asterisk_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_asterisk_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_asterisk_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the asterisk port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_asterisk_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_asterisk_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_asterisk_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the asterisk port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_asterisk_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_asterisk_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_asterisk_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the asterisk port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_asterisk_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_asterisk_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_asterisk_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the asterisk port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_asterisk_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_asterisk_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_asterisk_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the asterisk port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_asterisk_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_asterisk_port'($*)) dnl
-
- gen_require(`
- type asterisk_port_t;
- ')
-
- allow $1 asterisk_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_asterisk_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the asterisk port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_asterisk_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_asterisk_port'($*)) dnl
-
- gen_require(`
- type asterisk_port_t;
- ')
-
- allow $1 asterisk_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_asterisk_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the asterisk port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_asterisk_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_asterisk_port'($*)) dnl
-
- gen_require(`
- type asterisk_port_t;
- ')
-
- allow $1 asterisk_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_asterisk_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send asterisk_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_asterisk_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_asterisk_client_packets'($*)) dnl
-
- gen_require(`
- type asterisk_client_packet_t;
- ')
-
- allow $1 asterisk_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_asterisk_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send asterisk_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_asterisk_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_asterisk_client_packets'($*)) dnl
-
- gen_require(`
- type asterisk_client_packet_t;
- ')
-
- dontaudit $1 asterisk_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_asterisk_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive asterisk_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_asterisk_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_asterisk_client_packets'($*)) dnl
-
- gen_require(`
- type asterisk_client_packet_t;
- ')
-
- allow $1 asterisk_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_asterisk_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive asterisk_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_asterisk_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_asterisk_client_packets'($*)) dnl
-
- gen_require(`
- type asterisk_client_packet_t;
- ')
-
- dontaudit $1 asterisk_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_asterisk_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive asterisk_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_asterisk_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_asterisk_client_packets'($*)) dnl
-
- corenet_send_asterisk_client_packets($1)
- corenet_receive_asterisk_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_asterisk_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive asterisk_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_asterisk_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_asterisk_client_packets'($*)) dnl
-
- corenet_dontaudit_send_asterisk_client_packets($1)
- corenet_dontaudit_receive_asterisk_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_asterisk_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to asterisk_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_asterisk_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_asterisk_client_packets'($*)) dnl
-
- gen_require(`
- type asterisk_client_packet_t;
- ')
-
- allow $1 asterisk_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_asterisk_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send asterisk_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_asterisk_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_asterisk_server_packets'($*)) dnl
-
- gen_require(`
- type asterisk_server_packet_t;
- ')
-
- allow $1 asterisk_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_asterisk_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send asterisk_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_asterisk_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_asterisk_server_packets'($*)) dnl
-
- gen_require(`
- type asterisk_server_packet_t;
- ')
-
- dontaudit $1 asterisk_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_asterisk_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive asterisk_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_asterisk_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_asterisk_server_packets'($*)) dnl
-
- gen_require(`
- type asterisk_server_packet_t;
- ')
-
- allow $1 asterisk_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_asterisk_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive asterisk_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_asterisk_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_asterisk_server_packets'($*)) dnl
-
- gen_require(`
- type asterisk_server_packet_t;
- ')
-
- dontaudit $1 asterisk_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_asterisk_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive asterisk_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_asterisk_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_asterisk_server_packets'($*)) dnl
-
- corenet_send_asterisk_server_packets($1)
- corenet_receive_asterisk_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_asterisk_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive asterisk_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_asterisk_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_asterisk_server_packets'($*)) dnl
-
- corenet_dontaudit_send_asterisk_server_packets($1)
- corenet_dontaudit_receive_asterisk_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_asterisk_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to asterisk_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_asterisk_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_asterisk_server_packets'($*)) dnl
-
- gen_require(`
- type asterisk_server_packet_t;
- ')
-
- allow $1 asterisk_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_asterisk_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the audit port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_audit_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_audit_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_audit_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the audit port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_audit_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_audit_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_audit_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the audit port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_audit_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_audit_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_audit_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the audit port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_audit_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_audit_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_audit_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the audit port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_audit_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_audit_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_audit_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the audit port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_audit_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_audit_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_audit_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the audit port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_audit_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_audit_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_audit_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the audit port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_audit_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_audit_port'($*)) dnl
-
- gen_require(`
- type audit_port_t;
- ')
-
- allow $1 audit_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_audit_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the audit port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_audit_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_audit_port'($*)) dnl
-
- gen_require(`
- type audit_port_t;
- ')
-
- allow $1 audit_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_audit_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the audit port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_audit_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_audit_port'($*)) dnl
-
- gen_require(`
- type audit_port_t;
- ')
-
- allow $1 audit_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_audit_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send audit_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_audit_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_audit_client_packets'($*)) dnl
-
- gen_require(`
- type audit_client_packet_t;
- ')
-
- allow $1 audit_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_audit_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send audit_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_audit_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_audit_client_packets'($*)) dnl
-
- gen_require(`
- type audit_client_packet_t;
- ')
-
- dontaudit $1 audit_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_audit_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive audit_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_audit_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_audit_client_packets'($*)) dnl
-
- gen_require(`
- type audit_client_packet_t;
- ')
-
- allow $1 audit_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_audit_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive audit_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_audit_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_audit_client_packets'($*)) dnl
-
- gen_require(`
- type audit_client_packet_t;
- ')
-
- dontaudit $1 audit_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_audit_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive audit_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_audit_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_audit_client_packets'($*)) dnl
-
- corenet_send_audit_client_packets($1)
- corenet_receive_audit_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_audit_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive audit_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_audit_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_audit_client_packets'($*)) dnl
-
- corenet_dontaudit_send_audit_client_packets($1)
- corenet_dontaudit_receive_audit_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_audit_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to audit_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_audit_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_audit_client_packets'($*)) dnl
-
- gen_require(`
- type audit_client_packet_t;
- ')
-
- allow $1 audit_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_audit_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send audit_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_audit_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_audit_server_packets'($*)) dnl
-
- gen_require(`
- type audit_server_packet_t;
- ')
-
- allow $1 audit_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_audit_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send audit_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_audit_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_audit_server_packets'($*)) dnl
-
- gen_require(`
- type audit_server_packet_t;
- ')
-
- dontaudit $1 audit_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_audit_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive audit_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_audit_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_audit_server_packets'($*)) dnl
-
- gen_require(`
- type audit_server_packet_t;
- ')
-
- allow $1 audit_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_audit_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive audit_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_audit_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_audit_server_packets'($*)) dnl
-
- gen_require(`
- type audit_server_packet_t;
- ')
-
- dontaudit $1 audit_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_audit_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive audit_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_audit_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_audit_server_packets'($*)) dnl
-
- corenet_send_audit_server_packets($1)
- corenet_receive_audit_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_audit_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive audit_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_audit_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_audit_server_packets'($*)) dnl
-
- corenet_dontaudit_send_audit_server_packets($1)
- corenet_dontaudit_receive_audit_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_audit_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to audit_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_audit_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_audit_server_packets'($*)) dnl
-
- gen_require(`
- type audit_server_packet_t;
- ')
-
- allow $1 audit_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_audit_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the auth port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_auth_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_auth_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_auth_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the auth port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_auth_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_auth_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_auth_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the auth port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_auth_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_auth_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_auth_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the auth port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_auth_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_auth_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_auth_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the auth port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_auth_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_auth_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_auth_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the auth port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_auth_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_auth_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_auth_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the auth port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_auth_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_auth_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_auth_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the auth port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_auth_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_auth_port'($*)) dnl
-
- gen_require(`
- type auth_port_t;
- ')
-
- allow $1 auth_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_auth_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the auth port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_auth_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_auth_port'($*)) dnl
-
- gen_require(`
- type auth_port_t;
- ')
-
- allow $1 auth_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_auth_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the auth port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_auth_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_auth_port'($*)) dnl
-
- gen_require(`
- type auth_port_t;
- ')
-
- allow $1 auth_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_auth_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send auth_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_auth_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_auth_client_packets'($*)) dnl
-
- gen_require(`
- type auth_client_packet_t;
- ')
-
- allow $1 auth_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_auth_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send auth_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_auth_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_auth_client_packets'($*)) dnl
-
- gen_require(`
- type auth_client_packet_t;
- ')
-
- dontaudit $1 auth_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_auth_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive auth_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_auth_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_auth_client_packets'($*)) dnl
-
- gen_require(`
- type auth_client_packet_t;
- ')
-
- allow $1 auth_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_auth_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive auth_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_auth_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_auth_client_packets'($*)) dnl
-
- gen_require(`
- type auth_client_packet_t;
- ')
-
- dontaudit $1 auth_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_auth_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive auth_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_auth_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_auth_client_packets'($*)) dnl
-
- corenet_send_auth_client_packets($1)
- corenet_receive_auth_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_auth_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive auth_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_auth_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_auth_client_packets'($*)) dnl
-
- corenet_dontaudit_send_auth_client_packets($1)
- corenet_dontaudit_receive_auth_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_auth_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to auth_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_auth_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_auth_client_packets'($*)) dnl
-
- gen_require(`
- type auth_client_packet_t;
- ')
-
- allow $1 auth_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_auth_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send auth_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_auth_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_auth_server_packets'($*)) dnl
-
- gen_require(`
- type auth_server_packet_t;
- ')
-
- allow $1 auth_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_auth_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send auth_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_auth_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_auth_server_packets'($*)) dnl
-
- gen_require(`
- type auth_server_packet_t;
- ')
-
- dontaudit $1 auth_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_auth_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive auth_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_auth_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_auth_server_packets'($*)) dnl
-
- gen_require(`
- type auth_server_packet_t;
- ')
-
- allow $1 auth_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_auth_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive auth_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_auth_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_auth_server_packets'($*)) dnl
-
- gen_require(`
- type auth_server_packet_t;
- ')
-
- dontaudit $1 auth_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_auth_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive auth_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_auth_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_auth_server_packets'($*)) dnl
-
- corenet_send_auth_server_packets($1)
- corenet_receive_auth_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_auth_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive auth_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_auth_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_auth_server_packets'($*)) dnl
-
- corenet_dontaudit_send_auth_server_packets($1)
- corenet_dontaudit_receive_auth_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_auth_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to auth_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_auth_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_auth_server_packets'($*)) dnl
-
- gen_require(`
- type auth_server_packet_t;
- ')
-
- allow $1 auth_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_auth_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the bgp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_bgp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_bgp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_bgp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the bgp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_bgp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_bgp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_bgp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the bgp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_bgp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_bgp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_bgp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the bgp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_bgp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_bgp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_bgp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the bgp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_bgp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_bgp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_bgp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the bgp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_bgp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_bgp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_bgp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the bgp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_bgp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_bgp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_bgp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the bgp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_bgp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_bgp_port'($*)) dnl
-
- gen_require(`
- type bgp_port_t;
- ')
-
- allow $1 bgp_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_bgp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the bgp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_bgp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_bgp_port'($*)) dnl
-
- gen_require(`
- type bgp_port_t;
- ')
-
- allow $1 bgp_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_bgp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the bgp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_bgp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_bgp_port'($*)) dnl
-
- gen_require(`
- type bgp_port_t;
- ')
-
- allow $1 bgp_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_bgp_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send bgp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_bgp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_bgp_client_packets'($*)) dnl
-
- gen_require(`
- type bgp_client_packet_t;
- ')
-
- allow $1 bgp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_bgp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send bgp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_bgp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_bgp_client_packets'($*)) dnl
-
- gen_require(`
- type bgp_client_packet_t;
- ')
-
- dontaudit $1 bgp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_bgp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive bgp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_bgp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_bgp_client_packets'($*)) dnl
-
- gen_require(`
- type bgp_client_packet_t;
- ')
-
- allow $1 bgp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_bgp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive bgp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_bgp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_bgp_client_packets'($*)) dnl
-
- gen_require(`
- type bgp_client_packet_t;
- ')
-
- dontaudit $1 bgp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_bgp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive bgp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_bgp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_bgp_client_packets'($*)) dnl
-
- corenet_send_bgp_client_packets($1)
- corenet_receive_bgp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_bgp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive bgp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_bgp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_bgp_client_packets'($*)) dnl
-
- corenet_dontaudit_send_bgp_client_packets($1)
- corenet_dontaudit_receive_bgp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_bgp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to bgp_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_bgp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_bgp_client_packets'($*)) dnl
-
- gen_require(`
- type bgp_client_packet_t;
- ')
-
- allow $1 bgp_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_bgp_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send bgp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_bgp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_bgp_server_packets'($*)) dnl
-
- gen_require(`
- type bgp_server_packet_t;
- ')
-
- allow $1 bgp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_bgp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send bgp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_bgp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_bgp_server_packets'($*)) dnl
-
- gen_require(`
- type bgp_server_packet_t;
- ')
-
- dontaudit $1 bgp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_bgp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive bgp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_bgp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_bgp_server_packets'($*)) dnl
-
- gen_require(`
- type bgp_server_packet_t;
- ')
-
- allow $1 bgp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_bgp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive bgp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_bgp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_bgp_server_packets'($*)) dnl
-
- gen_require(`
- type bgp_server_packet_t;
- ')
-
- dontaudit $1 bgp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_bgp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive bgp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_bgp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_bgp_server_packets'($*)) dnl
-
- corenet_send_bgp_server_packets($1)
- corenet_receive_bgp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_bgp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive bgp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_bgp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_bgp_server_packets'($*)) dnl
-
- corenet_dontaudit_send_bgp_server_packets($1)
- corenet_dontaudit_receive_bgp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_bgp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to bgp_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_bgp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_bgp_server_packets'($*)) dnl
-
- gen_require(`
- type bgp_server_packet_t;
- ')
-
- allow $1 bgp_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_bgp_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the bitcoin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_bitcoin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_bitcoin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_bitcoin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the bitcoin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_bitcoin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_bitcoin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_bitcoin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the bitcoin port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_bitcoin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_bitcoin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_bitcoin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the bitcoin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_bitcoin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_bitcoin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_bitcoin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the bitcoin port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_bitcoin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_bitcoin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_bitcoin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the bitcoin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_bitcoin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_bitcoin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_bitcoin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the bitcoin port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_bitcoin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_bitcoin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_bitcoin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the bitcoin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_bitcoin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_bitcoin_port'($*)) dnl
-
- gen_require(`
- type bitcoin_port_t;
- ')
-
- allow $1 bitcoin_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_bitcoin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the bitcoin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_bitcoin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_bitcoin_port'($*)) dnl
-
- gen_require(`
- type bitcoin_port_t;
- ')
-
- allow $1 bitcoin_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_bitcoin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the bitcoin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_bitcoin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_bitcoin_port'($*)) dnl
-
- gen_require(`
- type bitcoin_port_t;
- ')
-
- allow $1 bitcoin_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_bitcoin_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send bitcoin_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_bitcoin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_bitcoin_client_packets'($*)) dnl
-
- gen_require(`
- type bitcoin_client_packet_t;
- ')
-
- allow $1 bitcoin_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_bitcoin_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send bitcoin_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_bitcoin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_bitcoin_client_packets'($*)) dnl
-
- gen_require(`
- type bitcoin_client_packet_t;
- ')
-
- dontaudit $1 bitcoin_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_bitcoin_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive bitcoin_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_bitcoin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_bitcoin_client_packets'($*)) dnl
-
- gen_require(`
- type bitcoin_client_packet_t;
- ')
-
- allow $1 bitcoin_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_bitcoin_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive bitcoin_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_bitcoin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_bitcoin_client_packets'($*)) dnl
-
- gen_require(`
- type bitcoin_client_packet_t;
- ')
-
- dontaudit $1 bitcoin_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_bitcoin_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive bitcoin_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_bitcoin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_bitcoin_client_packets'($*)) dnl
-
- corenet_send_bitcoin_client_packets($1)
- corenet_receive_bitcoin_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_bitcoin_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive bitcoin_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_bitcoin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_bitcoin_client_packets'($*)) dnl
-
- corenet_dontaudit_send_bitcoin_client_packets($1)
- corenet_dontaudit_receive_bitcoin_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_bitcoin_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to bitcoin_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_bitcoin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_bitcoin_client_packets'($*)) dnl
-
- gen_require(`
- type bitcoin_client_packet_t;
- ')
-
- allow $1 bitcoin_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_bitcoin_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send bitcoin_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_bitcoin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_bitcoin_server_packets'($*)) dnl
-
- gen_require(`
- type bitcoin_server_packet_t;
- ')
-
- allow $1 bitcoin_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_bitcoin_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send bitcoin_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_bitcoin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_bitcoin_server_packets'($*)) dnl
-
- gen_require(`
- type bitcoin_server_packet_t;
- ')
-
- dontaudit $1 bitcoin_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_bitcoin_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive bitcoin_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_bitcoin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_bitcoin_server_packets'($*)) dnl
-
- gen_require(`
- type bitcoin_server_packet_t;
- ')
-
- allow $1 bitcoin_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_bitcoin_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive bitcoin_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_bitcoin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_bitcoin_server_packets'($*)) dnl
-
- gen_require(`
- type bitcoin_server_packet_t;
- ')
-
- dontaudit $1 bitcoin_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_bitcoin_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive bitcoin_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_bitcoin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_bitcoin_server_packets'($*)) dnl
-
- corenet_send_bitcoin_server_packets($1)
- corenet_receive_bitcoin_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_bitcoin_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive bitcoin_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_bitcoin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_bitcoin_server_packets'($*)) dnl
-
- corenet_dontaudit_send_bitcoin_server_packets($1)
- corenet_dontaudit_receive_bitcoin_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_bitcoin_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to bitcoin_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_bitcoin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_bitcoin_server_packets'($*)) dnl
-
- gen_require(`
- type bitcoin_server_packet_t;
- ')
-
- allow $1 bitcoin_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_bitcoin_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the boinc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_boinc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_boinc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_boinc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the boinc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_boinc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_boinc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_boinc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the boinc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_boinc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_boinc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_boinc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the boinc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_boinc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_boinc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_boinc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the boinc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_boinc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_boinc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_boinc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the boinc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_boinc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_boinc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_boinc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the boinc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_boinc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_boinc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_boinc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the boinc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_boinc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_boinc_port'($*)) dnl
-
- gen_require(`
- type boinc_port_t;
- ')
-
- allow $1 boinc_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_boinc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the boinc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_boinc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_boinc_port'($*)) dnl
-
- gen_require(`
- type boinc_port_t;
- ')
-
- allow $1 boinc_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_boinc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the boinc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_boinc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_boinc_port'($*)) dnl
-
- gen_require(`
- type boinc_port_t;
- ')
-
- allow $1 boinc_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_boinc_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send boinc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_boinc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_boinc_client_packets'($*)) dnl
-
- gen_require(`
- type boinc_client_packet_t;
- ')
-
- allow $1 boinc_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_boinc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send boinc_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_boinc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_boinc_client_packets'($*)) dnl
-
- gen_require(`
- type boinc_client_packet_t;
- ')
-
- dontaudit $1 boinc_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_boinc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive boinc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_boinc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_boinc_client_packets'($*)) dnl
-
- gen_require(`
- type boinc_client_packet_t;
- ')
-
- allow $1 boinc_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_boinc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive boinc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_boinc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_boinc_client_packets'($*)) dnl
-
- gen_require(`
- type boinc_client_packet_t;
- ')
-
- dontaudit $1 boinc_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_boinc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive boinc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_boinc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_boinc_client_packets'($*)) dnl
-
- corenet_send_boinc_client_packets($1)
- corenet_receive_boinc_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_boinc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive boinc_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_boinc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_boinc_client_packets'($*)) dnl
-
- corenet_dontaudit_send_boinc_client_packets($1)
- corenet_dontaudit_receive_boinc_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_boinc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to boinc_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_boinc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_boinc_client_packets'($*)) dnl
-
- gen_require(`
- type boinc_client_packet_t;
- ')
-
- allow $1 boinc_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_boinc_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send boinc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_boinc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_boinc_server_packets'($*)) dnl
-
- gen_require(`
- type boinc_server_packet_t;
- ')
-
- allow $1 boinc_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_boinc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send boinc_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_boinc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_boinc_server_packets'($*)) dnl
-
- gen_require(`
- type boinc_server_packet_t;
- ')
-
- dontaudit $1 boinc_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_boinc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive boinc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_boinc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_boinc_server_packets'($*)) dnl
-
- gen_require(`
- type boinc_server_packet_t;
- ')
-
- allow $1 boinc_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_boinc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive boinc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_boinc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_boinc_server_packets'($*)) dnl
-
- gen_require(`
- type boinc_server_packet_t;
- ')
-
- dontaudit $1 boinc_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_boinc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive boinc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_boinc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_boinc_server_packets'($*)) dnl
-
- corenet_send_boinc_server_packets($1)
- corenet_receive_boinc_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_boinc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive boinc_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_boinc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_boinc_server_packets'($*)) dnl
-
- corenet_dontaudit_send_boinc_server_packets($1)
- corenet_dontaudit_receive_boinc_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_boinc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to boinc_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_boinc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_boinc_server_packets'($*)) dnl
-
- gen_require(`
- type boinc_server_packet_t;
- ')
-
- allow $1 boinc_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_boinc_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the boinc_client port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_boinc_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_boinc_client_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_boinc_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the boinc_client port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_boinc_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_boinc_client_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_boinc_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the boinc_client port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_boinc_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_boinc_client_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_boinc_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the boinc_client port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_boinc_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_boinc_client_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_boinc_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the boinc_client port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_boinc_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_boinc_client_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_boinc_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the boinc_client port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_boinc_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_boinc_client_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_boinc_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the boinc_client port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_boinc_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_boinc_client_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_boinc_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the boinc_client port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_boinc_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_boinc_client_port'($*)) dnl
-
- gen_require(`
- type boinc_client_port_t;
- ')
-
- allow $1 boinc_client_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_boinc_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the boinc_client port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_boinc_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_boinc_client_port'($*)) dnl
-
- gen_require(`
- type boinc_client_port_t;
- ')
-
- allow $1 boinc_client_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_boinc_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the boinc_client port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_boinc_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_boinc_client_port'($*)) dnl
-
- gen_require(`
- type boinc_client_port_t;
- ')
-
- allow $1 boinc_client_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_boinc_client_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send boinc_client_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_boinc_client_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_boinc_client_client_packets'($*)) dnl
-
- gen_require(`
- type boinc_client_client_packet_t;
- ')
-
- allow $1 boinc_client_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_boinc_client_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send boinc_client_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_boinc_client_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_boinc_client_client_packets'($*)) dnl
-
- gen_require(`
- type boinc_client_client_packet_t;
- ')
-
- dontaudit $1 boinc_client_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_boinc_client_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive boinc_client_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_boinc_client_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_boinc_client_client_packets'($*)) dnl
-
- gen_require(`
- type boinc_client_client_packet_t;
- ')
-
- allow $1 boinc_client_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_boinc_client_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive boinc_client_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_boinc_client_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_boinc_client_client_packets'($*)) dnl
-
- gen_require(`
- type boinc_client_client_packet_t;
- ')
-
- dontaudit $1 boinc_client_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_boinc_client_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive boinc_client_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_boinc_client_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_boinc_client_client_packets'($*)) dnl
-
- corenet_send_boinc_client_client_packets($1)
- corenet_receive_boinc_client_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_boinc_client_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive boinc_client_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_boinc_client_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_boinc_client_client_packets'($*)) dnl
-
- corenet_dontaudit_send_boinc_client_client_packets($1)
- corenet_dontaudit_receive_boinc_client_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_boinc_client_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to boinc_client_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_boinc_client_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_boinc_client_client_packets'($*)) dnl
-
- gen_require(`
- type boinc_client_client_packet_t;
- ')
-
- allow $1 boinc_client_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_boinc_client_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send boinc_client_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_boinc_client_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_boinc_client_server_packets'($*)) dnl
-
- gen_require(`
- type boinc_client_server_packet_t;
- ')
-
- allow $1 boinc_client_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_boinc_client_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send boinc_client_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_boinc_client_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_boinc_client_server_packets'($*)) dnl
-
- gen_require(`
- type boinc_client_server_packet_t;
- ')
-
- dontaudit $1 boinc_client_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_boinc_client_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive boinc_client_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_boinc_client_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_boinc_client_server_packets'($*)) dnl
-
- gen_require(`
- type boinc_client_server_packet_t;
- ')
-
- allow $1 boinc_client_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_boinc_client_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive boinc_client_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_boinc_client_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_boinc_client_server_packets'($*)) dnl
-
- gen_require(`
- type boinc_client_server_packet_t;
- ')
-
- dontaudit $1 boinc_client_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_boinc_client_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive boinc_client_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_boinc_client_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_boinc_client_server_packets'($*)) dnl
-
- corenet_send_boinc_client_server_packets($1)
- corenet_receive_boinc_client_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_boinc_client_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive boinc_client_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_boinc_client_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_boinc_client_server_packets'($*)) dnl
-
- corenet_dontaudit_send_boinc_client_server_packets($1)
- corenet_dontaudit_receive_boinc_client_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_boinc_client_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to boinc_client_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_boinc_client_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_boinc_client_server_packets'($*)) dnl
-
- gen_require(`
- type boinc_client_server_packet_t;
- ')
-
- allow $1 boinc_client_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_boinc_client_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the biff port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_biff_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_biff_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_biff_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the biff port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_biff_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_biff_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_biff_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the biff port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_biff_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_biff_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_biff_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the biff port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_biff_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_biff_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_biff_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the biff port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_biff_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_biff_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_biff_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the biff port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_biff_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_biff_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_biff_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the biff port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_biff_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_biff_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_biff_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the biff port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_biff_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_biff_port'($*)) dnl
-
- gen_require(`
- type biff_port_t;
- ')
-
- allow $1 biff_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_biff_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the biff port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_biff_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_biff_port'($*)) dnl
-
- gen_require(`
- type biff_port_t;
- ')
-
- allow $1 biff_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_biff_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the biff port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_biff_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_biff_port'($*)) dnl
-
- gen_require(`
- type biff_port_t;
- ')
-
- allow $1 biff_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_biff_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send biff_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_biff_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_biff_client_packets'($*)) dnl
-
- gen_require(`
- type biff_client_packet_t;
- ')
-
- allow $1 biff_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_biff_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send biff_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_biff_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_biff_client_packets'($*)) dnl
-
- gen_require(`
- type biff_client_packet_t;
- ')
-
- dontaudit $1 biff_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_biff_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive biff_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_biff_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_biff_client_packets'($*)) dnl
-
- gen_require(`
- type biff_client_packet_t;
- ')
-
- allow $1 biff_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_biff_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive biff_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_biff_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_biff_client_packets'($*)) dnl
-
- gen_require(`
- type biff_client_packet_t;
- ')
-
- dontaudit $1 biff_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_biff_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive biff_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_biff_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_biff_client_packets'($*)) dnl
-
- corenet_send_biff_client_packets($1)
- corenet_receive_biff_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_biff_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive biff_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_biff_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_biff_client_packets'($*)) dnl
-
- corenet_dontaudit_send_biff_client_packets($1)
- corenet_dontaudit_receive_biff_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_biff_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to biff_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_biff_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_biff_client_packets'($*)) dnl
-
- gen_require(`
- type biff_client_packet_t;
- ')
-
- allow $1 biff_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_biff_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send biff_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_biff_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_biff_server_packets'($*)) dnl
-
- gen_require(`
- type biff_server_packet_t;
- ')
-
- allow $1 biff_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_biff_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send biff_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_biff_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_biff_server_packets'($*)) dnl
-
- gen_require(`
- type biff_server_packet_t;
- ')
-
- dontaudit $1 biff_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_biff_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive biff_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_biff_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_biff_server_packets'($*)) dnl
-
- gen_require(`
- type biff_server_packet_t;
- ')
-
- allow $1 biff_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_biff_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive biff_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_biff_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_biff_server_packets'($*)) dnl
-
- gen_require(`
- type biff_server_packet_t;
- ')
-
- dontaudit $1 biff_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_biff_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive biff_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_biff_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_biff_server_packets'($*)) dnl
-
- corenet_send_biff_server_packets($1)
- corenet_receive_biff_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_biff_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive biff_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_biff_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_biff_server_packets'($*)) dnl
-
- corenet_dontaudit_send_biff_server_packets($1)
- corenet_dontaudit_receive_biff_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_biff_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to biff_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_biff_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_biff_server_packets'($*)) dnl
-
- gen_require(`
- type biff_server_packet_t;
- ')
-
- allow $1 biff_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_biff_server_packets'($*)) dnl
- ')
-
-
- # no defined portcon
-
-
-########################################
-##
-## Send and receive TCP traffic on the certmaster port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_certmaster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_certmaster_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_certmaster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the certmaster port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_certmaster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_certmaster_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_certmaster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the certmaster port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_certmaster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_certmaster_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_certmaster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the certmaster port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_certmaster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_certmaster_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_certmaster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the certmaster port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_certmaster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_certmaster_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_certmaster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the certmaster port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_certmaster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_certmaster_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_certmaster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the certmaster port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_certmaster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_certmaster_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_certmaster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the certmaster port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_certmaster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_certmaster_port'($*)) dnl
-
- gen_require(`
- type certmaster_port_t;
- ')
-
- allow $1 certmaster_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_certmaster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the certmaster port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_certmaster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_certmaster_port'($*)) dnl
-
- gen_require(`
- type certmaster_port_t;
- ')
-
- allow $1 certmaster_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_certmaster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the certmaster port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_certmaster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_certmaster_port'($*)) dnl
-
- gen_require(`
- type certmaster_port_t;
- ')
-
- allow $1 certmaster_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_certmaster_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send certmaster_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_certmaster_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_certmaster_client_packets'($*)) dnl
-
- gen_require(`
- type certmaster_client_packet_t;
- ')
-
- allow $1 certmaster_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_certmaster_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send certmaster_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_certmaster_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_certmaster_client_packets'($*)) dnl
-
- gen_require(`
- type certmaster_client_packet_t;
- ')
-
- dontaudit $1 certmaster_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_certmaster_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive certmaster_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_certmaster_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_certmaster_client_packets'($*)) dnl
-
- gen_require(`
- type certmaster_client_packet_t;
- ')
-
- allow $1 certmaster_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_certmaster_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive certmaster_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_certmaster_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_certmaster_client_packets'($*)) dnl
-
- gen_require(`
- type certmaster_client_packet_t;
- ')
-
- dontaudit $1 certmaster_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_certmaster_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive certmaster_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_certmaster_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_certmaster_client_packets'($*)) dnl
-
- corenet_send_certmaster_client_packets($1)
- corenet_receive_certmaster_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_certmaster_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive certmaster_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_certmaster_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_certmaster_client_packets'($*)) dnl
-
- corenet_dontaudit_send_certmaster_client_packets($1)
- corenet_dontaudit_receive_certmaster_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_certmaster_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to certmaster_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_certmaster_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_certmaster_client_packets'($*)) dnl
-
- gen_require(`
- type certmaster_client_packet_t;
- ')
-
- allow $1 certmaster_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_certmaster_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send certmaster_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_certmaster_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_certmaster_server_packets'($*)) dnl
-
- gen_require(`
- type certmaster_server_packet_t;
- ')
-
- allow $1 certmaster_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_certmaster_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send certmaster_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_certmaster_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_certmaster_server_packets'($*)) dnl
-
- gen_require(`
- type certmaster_server_packet_t;
- ')
-
- dontaudit $1 certmaster_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_certmaster_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive certmaster_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_certmaster_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_certmaster_server_packets'($*)) dnl
-
- gen_require(`
- type certmaster_server_packet_t;
- ')
-
- allow $1 certmaster_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_certmaster_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive certmaster_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_certmaster_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_certmaster_server_packets'($*)) dnl
-
- gen_require(`
- type certmaster_server_packet_t;
- ')
-
- dontaudit $1 certmaster_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_certmaster_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive certmaster_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_certmaster_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_certmaster_server_packets'($*)) dnl
-
- corenet_send_certmaster_server_packets($1)
- corenet_receive_certmaster_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_certmaster_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive certmaster_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_certmaster_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_certmaster_server_packets'($*)) dnl
-
- corenet_dontaudit_send_certmaster_server_packets($1)
- corenet_dontaudit_receive_certmaster_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_certmaster_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to certmaster_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_certmaster_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_certmaster_server_packets'($*)) dnl
-
- gen_require(`
- type certmaster_server_packet_t;
- ')
-
- allow $1 certmaster_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_certmaster_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the chronyd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_chronyd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_chronyd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_chronyd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the chronyd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_chronyd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_chronyd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_chronyd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the chronyd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_chronyd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_chronyd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_chronyd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the chronyd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_chronyd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_chronyd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_chronyd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the chronyd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_chronyd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_chronyd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_chronyd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the chronyd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_chronyd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_chronyd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_chronyd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the chronyd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_chronyd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_chronyd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_chronyd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the chronyd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_chronyd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_chronyd_port'($*)) dnl
-
- gen_require(`
- type chronyd_port_t;
- ')
-
- allow $1 chronyd_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_chronyd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the chronyd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_chronyd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_chronyd_port'($*)) dnl
-
- gen_require(`
- type chronyd_port_t;
- ')
-
- allow $1 chronyd_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_chronyd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the chronyd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_chronyd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_chronyd_port'($*)) dnl
-
- gen_require(`
- type chronyd_port_t;
- ')
-
- allow $1 chronyd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_chronyd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send chronyd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_chronyd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_chronyd_client_packets'($*)) dnl
-
- gen_require(`
- type chronyd_client_packet_t;
- ')
-
- allow $1 chronyd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_chronyd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send chronyd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_chronyd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_chronyd_client_packets'($*)) dnl
-
- gen_require(`
- type chronyd_client_packet_t;
- ')
-
- dontaudit $1 chronyd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_chronyd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive chronyd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_chronyd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_chronyd_client_packets'($*)) dnl
-
- gen_require(`
- type chronyd_client_packet_t;
- ')
-
- allow $1 chronyd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_chronyd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive chronyd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_chronyd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_chronyd_client_packets'($*)) dnl
-
- gen_require(`
- type chronyd_client_packet_t;
- ')
-
- dontaudit $1 chronyd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_chronyd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive chronyd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_chronyd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_chronyd_client_packets'($*)) dnl
-
- corenet_send_chronyd_client_packets($1)
- corenet_receive_chronyd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_chronyd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive chronyd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_chronyd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_chronyd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_chronyd_client_packets($1)
- corenet_dontaudit_receive_chronyd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_chronyd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to chronyd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_chronyd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_chronyd_client_packets'($*)) dnl
-
- gen_require(`
- type chronyd_client_packet_t;
- ')
-
- allow $1 chronyd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_chronyd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send chronyd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_chronyd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_chronyd_server_packets'($*)) dnl
-
- gen_require(`
- type chronyd_server_packet_t;
- ')
-
- allow $1 chronyd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_chronyd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send chronyd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_chronyd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_chronyd_server_packets'($*)) dnl
-
- gen_require(`
- type chronyd_server_packet_t;
- ')
-
- dontaudit $1 chronyd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_chronyd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive chronyd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_chronyd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_chronyd_server_packets'($*)) dnl
-
- gen_require(`
- type chronyd_server_packet_t;
- ')
-
- allow $1 chronyd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_chronyd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive chronyd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_chronyd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_chronyd_server_packets'($*)) dnl
-
- gen_require(`
- type chronyd_server_packet_t;
- ')
-
- dontaudit $1 chronyd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_chronyd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive chronyd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_chronyd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_chronyd_server_packets'($*)) dnl
-
- corenet_send_chronyd_server_packets($1)
- corenet_receive_chronyd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_chronyd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive chronyd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_chronyd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_chronyd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_chronyd_server_packets($1)
- corenet_dontaudit_receive_chronyd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_chronyd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to chronyd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_chronyd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_chronyd_server_packets'($*)) dnl
-
- gen_require(`
- type chronyd_server_packet_t;
- ')
-
- allow $1 chronyd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_chronyd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the clamd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_clamd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_clamd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_clamd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the clamd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_clamd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_clamd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_clamd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the clamd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_clamd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_clamd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_clamd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the clamd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_clamd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_clamd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_clamd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the clamd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_clamd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_clamd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_clamd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the clamd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_clamd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_clamd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_clamd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the clamd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_clamd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_clamd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_clamd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the clamd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_clamd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_clamd_port'($*)) dnl
-
- gen_require(`
- type clamd_port_t;
- ')
-
- allow $1 clamd_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_clamd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the clamd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_clamd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_clamd_port'($*)) dnl
-
- gen_require(`
- type clamd_port_t;
- ')
-
- allow $1 clamd_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_clamd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the clamd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_clamd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_clamd_port'($*)) dnl
-
- gen_require(`
- type clamd_port_t;
- ')
-
- allow $1 clamd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_clamd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send clamd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_clamd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_clamd_client_packets'($*)) dnl
-
- gen_require(`
- type clamd_client_packet_t;
- ')
-
- allow $1 clamd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_clamd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send clamd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_clamd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_clamd_client_packets'($*)) dnl
-
- gen_require(`
- type clamd_client_packet_t;
- ')
-
- dontaudit $1 clamd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_clamd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive clamd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_clamd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_clamd_client_packets'($*)) dnl
-
- gen_require(`
- type clamd_client_packet_t;
- ')
-
- allow $1 clamd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_clamd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive clamd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_clamd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_clamd_client_packets'($*)) dnl
-
- gen_require(`
- type clamd_client_packet_t;
- ')
-
- dontaudit $1 clamd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_clamd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive clamd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_clamd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_clamd_client_packets'($*)) dnl
-
- corenet_send_clamd_client_packets($1)
- corenet_receive_clamd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_clamd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive clamd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_clamd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_clamd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_clamd_client_packets($1)
- corenet_dontaudit_receive_clamd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_clamd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to clamd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_clamd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_clamd_client_packets'($*)) dnl
-
- gen_require(`
- type clamd_client_packet_t;
- ')
-
- allow $1 clamd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_clamd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send clamd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_clamd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_clamd_server_packets'($*)) dnl
-
- gen_require(`
- type clamd_server_packet_t;
- ')
-
- allow $1 clamd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_clamd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send clamd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_clamd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_clamd_server_packets'($*)) dnl
-
- gen_require(`
- type clamd_server_packet_t;
- ')
-
- dontaudit $1 clamd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_clamd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive clamd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_clamd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_clamd_server_packets'($*)) dnl
-
- gen_require(`
- type clamd_server_packet_t;
- ')
-
- allow $1 clamd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_clamd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive clamd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_clamd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_clamd_server_packets'($*)) dnl
-
- gen_require(`
- type clamd_server_packet_t;
- ')
-
- dontaudit $1 clamd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_clamd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive clamd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_clamd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_clamd_server_packets'($*)) dnl
-
- corenet_send_clamd_server_packets($1)
- corenet_receive_clamd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_clamd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive clamd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_clamd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_clamd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_clamd_server_packets($1)
- corenet_dontaudit_receive_clamd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_clamd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to clamd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_clamd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_clamd_server_packets'($*)) dnl
-
- gen_require(`
- type clamd_server_packet_t;
- ')
-
- allow $1 clamd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_clamd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the clockspeed port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_clockspeed_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_clockspeed_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_clockspeed_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the clockspeed port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_clockspeed_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_clockspeed_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_clockspeed_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the clockspeed port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_clockspeed_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_clockspeed_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_clockspeed_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the clockspeed port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_clockspeed_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_clockspeed_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_clockspeed_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the clockspeed port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_clockspeed_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_clockspeed_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_clockspeed_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the clockspeed port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_clockspeed_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_clockspeed_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_clockspeed_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the clockspeed port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_clockspeed_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_clockspeed_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_clockspeed_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the clockspeed port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_clockspeed_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_clockspeed_port'($*)) dnl
-
- gen_require(`
- type clockspeed_port_t;
- ')
-
- allow $1 clockspeed_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_clockspeed_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the clockspeed port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_clockspeed_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_clockspeed_port'($*)) dnl
-
- gen_require(`
- type clockspeed_port_t;
- ')
-
- allow $1 clockspeed_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_clockspeed_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the clockspeed port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_clockspeed_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_clockspeed_port'($*)) dnl
-
- gen_require(`
- type clockspeed_port_t;
- ')
-
- allow $1 clockspeed_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_clockspeed_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send clockspeed_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_clockspeed_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_clockspeed_client_packets'($*)) dnl
-
- gen_require(`
- type clockspeed_client_packet_t;
- ')
-
- allow $1 clockspeed_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_clockspeed_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send clockspeed_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_clockspeed_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_clockspeed_client_packets'($*)) dnl
-
- gen_require(`
- type clockspeed_client_packet_t;
- ')
-
- dontaudit $1 clockspeed_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_clockspeed_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive clockspeed_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_clockspeed_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_clockspeed_client_packets'($*)) dnl
-
- gen_require(`
- type clockspeed_client_packet_t;
- ')
-
- allow $1 clockspeed_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_clockspeed_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive clockspeed_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_clockspeed_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_clockspeed_client_packets'($*)) dnl
-
- gen_require(`
- type clockspeed_client_packet_t;
- ')
-
- dontaudit $1 clockspeed_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_clockspeed_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive clockspeed_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_clockspeed_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_clockspeed_client_packets'($*)) dnl
-
- corenet_send_clockspeed_client_packets($1)
- corenet_receive_clockspeed_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_clockspeed_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive clockspeed_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_clockspeed_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_clockspeed_client_packets'($*)) dnl
-
- corenet_dontaudit_send_clockspeed_client_packets($1)
- corenet_dontaudit_receive_clockspeed_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_clockspeed_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to clockspeed_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_clockspeed_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_clockspeed_client_packets'($*)) dnl
-
- gen_require(`
- type clockspeed_client_packet_t;
- ')
-
- allow $1 clockspeed_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_clockspeed_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send clockspeed_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_clockspeed_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_clockspeed_server_packets'($*)) dnl
-
- gen_require(`
- type clockspeed_server_packet_t;
- ')
-
- allow $1 clockspeed_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_clockspeed_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send clockspeed_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_clockspeed_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_clockspeed_server_packets'($*)) dnl
-
- gen_require(`
- type clockspeed_server_packet_t;
- ')
-
- dontaudit $1 clockspeed_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_clockspeed_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive clockspeed_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_clockspeed_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_clockspeed_server_packets'($*)) dnl
-
- gen_require(`
- type clockspeed_server_packet_t;
- ')
-
- allow $1 clockspeed_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_clockspeed_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive clockspeed_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_clockspeed_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_clockspeed_server_packets'($*)) dnl
-
- gen_require(`
- type clockspeed_server_packet_t;
- ')
-
- dontaudit $1 clockspeed_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_clockspeed_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive clockspeed_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_clockspeed_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_clockspeed_server_packets'($*)) dnl
-
- corenet_send_clockspeed_server_packets($1)
- corenet_receive_clockspeed_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_clockspeed_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive clockspeed_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_clockspeed_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_clockspeed_server_packets'($*)) dnl
-
- corenet_dontaudit_send_clockspeed_server_packets($1)
- corenet_dontaudit_receive_clockspeed_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_clockspeed_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to clockspeed_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_clockspeed_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_clockspeed_server_packets'($*)) dnl
-
- gen_require(`
- type clockspeed_server_packet_t;
- ')
-
- allow $1 clockspeed_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_clockspeed_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the cluster port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_cluster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_cluster_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_cluster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the cluster port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_cluster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_cluster_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_cluster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the cluster port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_cluster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_cluster_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_cluster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the cluster port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_cluster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_cluster_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_cluster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the cluster port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_cluster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_cluster_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_cluster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the cluster port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_cluster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_cluster_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_cluster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the cluster port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_cluster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_cluster_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_cluster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the cluster port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_cluster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_cluster_port'($*)) dnl
-
- gen_require(`
- type cluster_port_t;
- ')
-
- allow $1 cluster_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_cluster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the cluster port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_cluster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_cluster_port'($*)) dnl
-
- gen_require(`
- type cluster_port_t;
- ')
-
- allow $1 cluster_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_cluster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the cluster port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_cluster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_cluster_port'($*)) dnl
-
- gen_require(`
- type cluster_port_t;
- ')
-
- allow $1 cluster_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_cluster_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send cluster_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_cluster_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_cluster_client_packets'($*)) dnl
-
- gen_require(`
- type cluster_client_packet_t;
- ')
-
- allow $1 cluster_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_cluster_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send cluster_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_cluster_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_cluster_client_packets'($*)) dnl
-
- gen_require(`
- type cluster_client_packet_t;
- ')
-
- dontaudit $1 cluster_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_cluster_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive cluster_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_cluster_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_cluster_client_packets'($*)) dnl
-
- gen_require(`
- type cluster_client_packet_t;
- ')
-
- allow $1 cluster_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_cluster_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive cluster_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_cluster_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_cluster_client_packets'($*)) dnl
-
- gen_require(`
- type cluster_client_packet_t;
- ')
-
- dontaudit $1 cluster_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_cluster_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive cluster_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_cluster_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_cluster_client_packets'($*)) dnl
-
- corenet_send_cluster_client_packets($1)
- corenet_receive_cluster_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_cluster_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive cluster_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_cluster_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_cluster_client_packets'($*)) dnl
-
- corenet_dontaudit_send_cluster_client_packets($1)
- corenet_dontaudit_receive_cluster_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_cluster_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to cluster_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_cluster_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_cluster_client_packets'($*)) dnl
-
- gen_require(`
- type cluster_client_packet_t;
- ')
-
- allow $1 cluster_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_cluster_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send cluster_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_cluster_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_cluster_server_packets'($*)) dnl
-
- gen_require(`
- type cluster_server_packet_t;
- ')
-
- allow $1 cluster_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_cluster_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send cluster_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_cluster_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_cluster_server_packets'($*)) dnl
-
- gen_require(`
- type cluster_server_packet_t;
- ')
-
- dontaudit $1 cluster_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_cluster_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive cluster_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_cluster_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_cluster_server_packets'($*)) dnl
-
- gen_require(`
- type cluster_server_packet_t;
- ')
-
- allow $1 cluster_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_cluster_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive cluster_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_cluster_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_cluster_server_packets'($*)) dnl
-
- gen_require(`
- type cluster_server_packet_t;
- ')
-
- dontaudit $1 cluster_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_cluster_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive cluster_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_cluster_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_cluster_server_packets'($*)) dnl
-
- corenet_send_cluster_server_packets($1)
- corenet_receive_cluster_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_cluster_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive cluster_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_cluster_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_cluster_server_packets'($*)) dnl
-
- corenet_dontaudit_send_cluster_server_packets($1)
- corenet_dontaudit_receive_cluster_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_cluster_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to cluster_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_cluster_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_cluster_server_packets'($*)) dnl
-
- gen_require(`
- type cluster_server_packet_t;
- ')
-
- allow $1 cluster_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_cluster_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the cma port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_cma_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_cma_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_cma_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the cma port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_cma_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_cma_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_cma_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the cma port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_cma_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_cma_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_cma_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the cma port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_cma_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_cma_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_cma_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the cma port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_cma_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_cma_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_cma_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the cma port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_cma_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_cma_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_cma_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the cma port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_cma_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_cma_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_cma_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the cma port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_cma_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_cma_port'($*)) dnl
-
- gen_require(`
- type cma_port_t;
- ')
-
- allow $1 cma_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_cma_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the cma port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_cma_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_cma_port'($*)) dnl
-
- gen_require(`
- type cma_port_t;
- ')
-
- allow $1 cma_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_cma_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the cma port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_cma_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_cma_port'($*)) dnl
-
- gen_require(`
- type cma_port_t;
- ')
-
- allow $1 cma_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_cma_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send cma_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_cma_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_cma_client_packets'($*)) dnl
-
- gen_require(`
- type cma_client_packet_t;
- ')
-
- allow $1 cma_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_cma_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send cma_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_cma_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_cma_client_packets'($*)) dnl
-
- gen_require(`
- type cma_client_packet_t;
- ')
-
- dontaudit $1 cma_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_cma_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive cma_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_cma_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_cma_client_packets'($*)) dnl
-
- gen_require(`
- type cma_client_packet_t;
- ')
-
- allow $1 cma_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_cma_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive cma_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_cma_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_cma_client_packets'($*)) dnl
-
- gen_require(`
- type cma_client_packet_t;
- ')
-
- dontaudit $1 cma_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_cma_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive cma_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_cma_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_cma_client_packets'($*)) dnl
-
- corenet_send_cma_client_packets($1)
- corenet_receive_cma_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_cma_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive cma_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_cma_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_cma_client_packets'($*)) dnl
-
- corenet_dontaudit_send_cma_client_packets($1)
- corenet_dontaudit_receive_cma_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_cma_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to cma_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_cma_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_cma_client_packets'($*)) dnl
-
- gen_require(`
- type cma_client_packet_t;
- ')
-
- allow $1 cma_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_cma_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send cma_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_cma_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_cma_server_packets'($*)) dnl
-
- gen_require(`
- type cma_server_packet_t;
- ')
-
- allow $1 cma_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_cma_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send cma_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_cma_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_cma_server_packets'($*)) dnl
-
- gen_require(`
- type cma_server_packet_t;
- ')
-
- dontaudit $1 cma_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_cma_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive cma_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_cma_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_cma_server_packets'($*)) dnl
-
- gen_require(`
- type cma_server_packet_t;
- ')
-
- allow $1 cma_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_cma_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive cma_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_cma_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_cma_server_packets'($*)) dnl
-
- gen_require(`
- type cma_server_packet_t;
- ')
-
- dontaudit $1 cma_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_cma_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive cma_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_cma_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_cma_server_packets'($*)) dnl
-
- corenet_send_cma_server_packets($1)
- corenet_receive_cma_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_cma_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive cma_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_cma_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_cma_server_packets'($*)) dnl
-
- corenet_dontaudit_send_cma_server_packets($1)
- corenet_dontaudit_receive_cma_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_cma_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to cma_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_cma_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_cma_server_packets'($*)) dnl
-
- gen_require(`
- type cma_server_packet_t;
- ')
-
- allow $1 cma_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_cma_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the cobbler port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_cobbler_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_cobbler_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_cobbler_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the cobbler port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_cobbler_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_cobbler_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_cobbler_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the cobbler port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_cobbler_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_cobbler_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_cobbler_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the cobbler port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_cobbler_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_cobbler_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_cobbler_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the cobbler port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_cobbler_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_cobbler_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_cobbler_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the cobbler port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_cobbler_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_cobbler_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_cobbler_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the cobbler port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_cobbler_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_cobbler_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_cobbler_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the cobbler port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_cobbler_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_cobbler_port'($*)) dnl
-
- gen_require(`
- type cobbler_port_t;
- ')
-
- allow $1 cobbler_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_cobbler_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the cobbler port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_cobbler_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_cobbler_port'($*)) dnl
-
- gen_require(`
- type cobbler_port_t;
- ')
-
- allow $1 cobbler_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_cobbler_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the cobbler port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_cobbler_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_cobbler_port'($*)) dnl
-
- gen_require(`
- type cobbler_port_t;
- ')
-
- allow $1 cobbler_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_cobbler_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send cobbler_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_cobbler_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_cobbler_client_packets'($*)) dnl
-
- gen_require(`
- type cobbler_client_packet_t;
- ')
-
- allow $1 cobbler_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_cobbler_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send cobbler_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_cobbler_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_cobbler_client_packets'($*)) dnl
-
- gen_require(`
- type cobbler_client_packet_t;
- ')
-
- dontaudit $1 cobbler_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_cobbler_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive cobbler_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_cobbler_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_cobbler_client_packets'($*)) dnl
-
- gen_require(`
- type cobbler_client_packet_t;
- ')
-
- allow $1 cobbler_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_cobbler_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive cobbler_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_cobbler_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_cobbler_client_packets'($*)) dnl
-
- gen_require(`
- type cobbler_client_packet_t;
- ')
-
- dontaudit $1 cobbler_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_cobbler_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive cobbler_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_cobbler_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_cobbler_client_packets'($*)) dnl
-
- corenet_send_cobbler_client_packets($1)
- corenet_receive_cobbler_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_cobbler_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive cobbler_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_cobbler_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_cobbler_client_packets'($*)) dnl
-
- corenet_dontaudit_send_cobbler_client_packets($1)
- corenet_dontaudit_receive_cobbler_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_cobbler_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to cobbler_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_cobbler_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_cobbler_client_packets'($*)) dnl
-
- gen_require(`
- type cobbler_client_packet_t;
- ')
-
- allow $1 cobbler_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_cobbler_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send cobbler_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_cobbler_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_cobbler_server_packets'($*)) dnl
-
- gen_require(`
- type cobbler_server_packet_t;
- ')
-
- allow $1 cobbler_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_cobbler_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send cobbler_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_cobbler_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_cobbler_server_packets'($*)) dnl
-
- gen_require(`
- type cobbler_server_packet_t;
- ')
-
- dontaudit $1 cobbler_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_cobbler_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive cobbler_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_cobbler_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_cobbler_server_packets'($*)) dnl
-
- gen_require(`
- type cobbler_server_packet_t;
- ')
-
- allow $1 cobbler_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_cobbler_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive cobbler_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_cobbler_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_cobbler_server_packets'($*)) dnl
-
- gen_require(`
- type cobbler_server_packet_t;
- ')
-
- dontaudit $1 cobbler_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_cobbler_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive cobbler_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_cobbler_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_cobbler_server_packets'($*)) dnl
-
- corenet_send_cobbler_server_packets($1)
- corenet_receive_cobbler_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_cobbler_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive cobbler_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_cobbler_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_cobbler_server_packets'($*)) dnl
-
- corenet_dontaudit_send_cobbler_server_packets($1)
- corenet_dontaudit_receive_cobbler_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_cobbler_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to cobbler_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_cobbler_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_cobbler_server_packets'($*)) dnl
-
- gen_require(`
- type cobbler_server_packet_t;
- ')
-
- allow $1 cobbler_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_cobbler_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the commplex_link port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_commplex_link_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_commplex_link_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_commplex_link_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the commplex_link port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_commplex_link_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_commplex_link_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_commplex_link_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the commplex_link port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_commplex_link_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_commplex_link_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_commplex_link_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the commplex_link port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_commplex_link_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_commplex_link_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_commplex_link_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the commplex_link port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_commplex_link_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_commplex_link_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_commplex_link_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the commplex_link port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_commplex_link_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_commplex_link_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_commplex_link_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the commplex_link port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_commplex_link_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_commplex_link_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_commplex_link_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the commplex_link port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_commplex_link_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_commplex_link_port'($*)) dnl
-
- gen_require(`
- type commplex_link_port_t;
- ')
-
- allow $1 commplex_link_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_commplex_link_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the commplex_link port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_commplex_link_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_commplex_link_port'($*)) dnl
-
- gen_require(`
- type commplex_link_port_t;
- ')
-
- allow $1 commplex_link_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_commplex_link_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the commplex_link port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_commplex_link_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_commplex_link_port'($*)) dnl
-
- gen_require(`
- type commplex_link_port_t;
- ')
-
- allow $1 commplex_link_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_commplex_link_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send commplex_link_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_commplex_link_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_commplex_link_client_packets'($*)) dnl
-
- gen_require(`
- type commplex_link_client_packet_t;
- ')
-
- allow $1 commplex_link_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_commplex_link_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send commplex_link_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_commplex_link_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_commplex_link_client_packets'($*)) dnl
-
- gen_require(`
- type commplex_link_client_packet_t;
- ')
-
- dontaudit $1 commplex_link_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_commplex_link_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive commplex_link_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_commplex_link_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_commplex_link_client_packets'($*)) dnl
-
- gen_require(`
- type commplex_link_client_packet_t;
- ')
-
- allow $1 commplex_link_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_commplex_link_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive commplex_link_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_commplex_link_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_commplex_link_client_packets'($*)) dnl
-
- gen_require(`
- type commplex_link_client_packet_t;
- ')
-
- dontaudit $1 commplex_link_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_commplex_link_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive commplex_link_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_commplex_link_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_commplex_link_client_packets'($*)) dnl
-
- corenet_send_commplex_link_client_packets($1)
- corenet_receive_commplex_link_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_commplex_link_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive commplex_link_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_commplex_link_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_commplex_link_client_packets'($*)) dnl
-
- corenet_dontaudit_send_commplex_link_client_packets($1)
- corenet_dontaudit_receive_commplex_link_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_commplex_link_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to commplex_link_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_commplex_link_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_commplex_link_client_packets'($*)) dnl
-
- gen_require(`
- type commplex_link_client_packet_t;
- ')
-
- allow $1 commplex_link_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_commplex_link_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send commplex_link_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_commplex_link_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_commplex_link_server_packets'($*)) dnl
-
- gen_require(`
- type commplex_link_server_packet_t;
- ')
-
- allow $1 commplex_link_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_commplex_link_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send commplex_link_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_commplex_link_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_commplex_link_server_packets'($*)) dnl
-
- gen_require(`
- type commplex_link_server_packet_t;
- ')
-
- dontaudit $1 commplex_link_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_commplex_link_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive commplex_link_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_commplex_link_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_commplex_link_server_packets'($*)) dnl
-
- gen_require(`
- type commplex_link_server_packet_t;
- ')
-
- allow $1 commplex_link_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_commplex_link_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive commplex_link_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_commplex_link_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_commplex_link_server_packets'($*)) dnl
-
- gen_require(`
- type commplex_link_server_packet_t;
- ')
-
- dontaudit $1 commplex_link_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_commplex_link_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive commplex_link_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_commplex_link_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_commplex_link_server_packets'($*)) dnl
-
- corenet_send_commplex_link_server_packets($1)
- corenet_receive_commplex_link_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_commplex_link_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive commplex_link_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_commplex_link_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_commplex_link_server_packets'($*)) dnl
-
- corenet_dontaudit_send_commplex_link_server_packets($1)
- corenet_dontaudit_receive_commplex_link_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_commplex_link_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to commplex_link_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_commplex_link_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_commplex_link_server_packets'($*)) dnl
-
- gen_require(`
- type commplex_link_server_packet_t;
- ')
-
- allow $1 commplex_link_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_commplex_link_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the commplex_main port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_commplex_main_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_commplex_main_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_commplex_main_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the commplex_main port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_commplex_main_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_commplex_main_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_commplex_main_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the commplex_main port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_commplex_main_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_commplex_main_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_commplex_main_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the commplex_main port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_commplex_main_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_commplex_main_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_commplex_main_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the commplex_main port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_commplex_main_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_commplex_main_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_commplex_main_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the commplex_main port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_commplex_main_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_commplex_main_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_commplex_main_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the commplex_main port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_commplex_main_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_commplex_main_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_commplex_main_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the commplex_main port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_commplex_main_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_commplex_main_port'($*)) dnl
-
- gen_require(`
- type commplex_main_port_t;
- ')
-
- allow $1 commplex_main_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_commplex_main_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the commplex_main port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_commplex_main_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_commplex_main_port'($*)) dnl
-
- gen_require(`
- type commplex_main_port_t;
- ')
-
- allow $1 commplex_main_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_commplex_main_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the commplex_main port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_commplex_main_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_commplex_main_port'($*)) dnl
-
- gen_require(`
- type commplex_main_port_t;
- ')
-
- allow $1 commplex_main_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_commplex_main_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send commplex_main_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_commplex_main_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_commplex_main_client_packets'($*)) dnl
-
- gen_require(`
- type commplex_main_client_packet_t;
- ')
-
- allow $1 commplex_main_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_commplex_main_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send commplex_main_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_commplex_main_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_commplex_main_client_packets'($*)) dnl
-
- gen_require(`
- type commplex_main_client_packet_t;
- ')
-
- dontaudit $1 commplex_main_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_commplex_main_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive commplex_main_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_commplex_main_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_commplex_main_client_packets'($*)) dnl
-
- gen_require(`
- type commplex_main_client_packet_t;
- ')
-
- allow $1 commplex_main_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_commplex_main_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive commplex_main_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_commplex_main_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_commplex_main_client_packets'($*)) dnl
-
- gen_require(`
- type commplex_main_client_packet_t;
- ')
-
- dontaudit $1 commplex_main_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_commplex_main_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive commplex_main_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_commplex_main_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_commplex_main_client_packets'($*)) dnl
-
- corenet_send_commplex_main_client_packets($1)
- corenet_receive_commplex_main_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_commplex_main_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive commplex_main_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_commplex_main_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_commplex_main_client_packets'($*)) dnl
-
- corenet_dontaudit_send_commplex_main_client_packets($1)
- corenet_dontaudit_receive_commplex_main_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_commplex_main_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to commplex_main_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_commplex_main_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_commplex_main_client_packets'($*)) dnl
-
- gen_require(`
- type commplex_main_client_packet_t;
- ')
-
- allow $1 commplex_main_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_commplex_main_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send commplex_main_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_commplex_main_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_commplex_main_server_packets'($*)) dnl
-
- gen_require(`
- type commplex_main_server_packet_t;
- ')
-
- allow $1 commplex_main_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_commplex_main_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send commplex_main_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_commplex_main_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_commplex_main_server_packets'($*)) dnl
-
- gen_require(`
- type commplex_main_server_packet_t;
- ')
-
- dontaudit $1 commplex_main_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_commplex_main_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive commplex_main_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_commplex_main_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_commplex_main_server_packets'($*)) dnl
-
- gen_require(`
- type commplex_main_server_packet_t;
- ')
-
- allow $1 commplex_main_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_commplex_main_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive commplex_main_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_commplex_main_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_commplex_main_server_packets'($*)) dnl
-
- gen_require(`
- type commplex_main_server_packet_t;
- ')
-
- dontaudit $1 commplex_main_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_commplex_main_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive commplex_main_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_commplex_main_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_commplex_main_server_packets'($*)) dnl
-
- corenet_send_commplex_main_server_packets($1)
- corenet_receive_commplex_main_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_commplex_main_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive commplex_main_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_commplex_main_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_commplex_main_server_packets'($*)) dnl
-
- corenet_dontaudit_send_commplex_main_server_packets($1)
- corenet_dontaudit_receive_commplex_main_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_commplex_main_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to commplex_main_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_commplex_main_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_commplex_main_server_packets'($*)) dnl
-
- gen_require(`
- type commplex_main_server_packet_t;
- ')
-
- allow $1 commplex_main_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_commplex_main_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the comsat port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_comsat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_comsat_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_comsat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the comsat port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_comsat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_comsat_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_comsat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the comsat port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_comsat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_comsat_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_comsat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the comsat port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_comsat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_comsat_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_comsat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the comsat port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_comsat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_comsat_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_comsat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the comsat port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_comsat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_comsat_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_comsat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the comsat port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_comsat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_comsat_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_comsat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the comsat port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_comsat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_comsat_port'($*)) dnl
-
- gen_require(`
- type comsat_port_t;
- ')
-
- allow $1 comsat_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_comsat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the comsat port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_comsat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_comsat_port'($*)) dnl
-
- gen_require(`
- type comsat_port_t;
- ')
-
- allow $1 comsat_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_comsat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the comsat port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_comsat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_comsat_port'($*)) dnl
-
- gen_require(`
- type comsat_port_t;
- ')
-
- allow $1 comsat_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_comsat_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send comsat_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_comsat_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_comsat_client_packets'($*)) dnl
-
- gen_require(`
- type comsat_client_packet_t;
- ')
-
- allow $1 comsat_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_comsat_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send comsat_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_comsat_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_comsat_client_packets'($*)) dnl
-
- gen_require(`
- type comsat_client_packet_t;
- ')
-
- dontaudit $1 comsat_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_comsat_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive comsat_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_comsat_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_comsat_client_packets'($*)) dnl
-
- gen_require(`
- type comsat_client_packet_t;
- ')
-
- allow $1 comsat_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_comsat_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive comsat_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_comsat_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_comsat_client_packets'($*)) dnl
-
- gen_require(`
- type comsat_client_packet_t;
- ')
-
- dontaudit $1 comsat_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_comsat_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive comsat_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_comsat_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_comsat_client_packets'($*)) dnl
-
- corenet_send_comsat_client_packets($1)
- corenet_receive_comsat_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_comsat_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive comsat_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_comsat_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_comsat_client_packets'($*)) dnl
-
- corenet_dontaudit_send_comsat_client_packets($1)
- corenet_dontaudit_receive_comsat_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_comsat_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to comsat_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_comsat_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_comsat_client_packets'($*)) dnl
-
- gen_require(`
- type comsat_client_packet_t;
- ')
-
- allow $1 comsat_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_comsat_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send comsat_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_comsat_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_comsat_server_packets'($*)) dnl
-
- gen_require(`
- type comsat_server_packet_t;
- ')
-
- allow $1 comsat_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_comsat_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send comsat_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_comsat_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_comsat_server_packets'($*)) dnl
-
- gen_require(`
- type comsat_server_packet_t;
- ')
-
- dontaudit $1 comsat_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_comsat_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive comsat_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_comsat_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_comsat_server_packets'($*)) dnl
-
- gen_require(`
- type comsat_server_packet_t;
- ')
-
- allow $1 comsat_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_comsat_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive comsat_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_comsat_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_comsat_server_packets'($*)) dnl
-
- gen_require(`
- type comsat_server_packet_t;
- ')
-
- dontaudit $1 comsat_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_comsat_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive comsat_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_comsat_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_comsat_server_packets'($*)) dnl
-
- corenet_send_comsat_server_packets($1)
- corenet_receive_comsat_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_comsat_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive comsat_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_comsat_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_comsat_server_packets'($*)) dnl
-
- corenet_dontaudit_send_comsat_server_packets($1)
- corenet_dontaudit_receive_comsat_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_comsat_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to comsat_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_comsat_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_comsat_server_packets'($*)) dnl
-
- gen_require(`
- type comsat_server_packet_t;
- ')
-
- allow $1 comsat_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_comsat_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the condor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_condor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_condor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_condor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the condor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_condor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_condor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_condor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the condor port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_condor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_condor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_condor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the condor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_condor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_condor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_condor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the condor port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_condor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_condor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_condor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the condor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_condor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_condor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_condor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the condor port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_condor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_condor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_condor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the condor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_condor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_condor_port'($*)) dnl
-
- gen_require(`
- type condor_port_t;
- ')
-
- allow $1 condor_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_condor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the condor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_condor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_condor_port'($*)) dnl
-
- gen_require(`
- type condor_port_t;
- ')
-
- allow $1 condor_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_condor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the condor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_condor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_condor_port'($*)) dnl
-
- gen_require(`
- type condor_port_t;
- ')
-
- allow $1 condor_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_condor_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send condor_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_condor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_condor_client_packets'($*)) dnl
-
- gen_require(`
- type condor_client_packet_t;
- ')
-
- allow $1 condor_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_condor_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send condor_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_condor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_condor_client_packets'($*)) dnl
-
- gen_require(`
- type condor_client_packet_t;
- ')
-
- dontaudit $1 condor_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_condor_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive condor_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_condor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_condor_client_packets'($*)) dnl
-
- gen_require(`
- type condor_client_packet_t;
- ')
-
- allow $1 condor_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_condor_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive condor_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_condor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_condor_client_packets'($*)) dnl
-
- gen_require(`
- type condor_client_packet_t;
- ')
-
- dontaudit $1 condor_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_condor_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive condor_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_condor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_condor_client_packets'($*)) dnl
-
- corenet_send_condor_client_packets($1)
- corenet_receive_condor_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_condor_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive condor_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_condor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_condor_client_packets'($*)) dnl
-
- corenet_dontaudit_send_condor_client_packets($1)
- corenet_dontaudit_receive_condor_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_condor_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to condor_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_condor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_condor_client_packets'($*)) dnl
-
- gen_require(`
- type condor_client_packet_t;
- ')
-
- allow $1 condor_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_condor_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send condor_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_condor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_condor_server_packets'($*)) dnl
-
- gen_require(`
- type condor_server_packet_t;
- ')
-
- allow $1 condor_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_condor_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send condor_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_condor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_condor_server_packets'($*)) dnl
-
- gen_require(`
- type condor_server_packet_t;
- ')
-
- dontaudit $1 condor_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_condor_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive condor_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_condor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_condor_server_packets'($*)) dnl
-
- gen_require(`
- type condor_server_packet_t;
- ')
-
- allow $1 condor_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_condor_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive condor_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_condor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_condor_server_packets'($*)) dnl
-
- gen_require(`
- type condor_server_packet_t;
- ')
-
- dontaudit $1 condor_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_condor_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive condor_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_condor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_condor_server_packets'($*)) dnl
-
- corenet_send_condor_server_packets($1)
- corenet_receive_condor_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_condor_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive condor_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_condor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_condor_server_packets'($*)) dnl
-
- corenet_dontaudit_send_condor_server_packets($1)
- corenet_dontaudit_receive_condor_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_condor_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to condor_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_condor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_condor_server_packets'($*)) dnl
-
- gen_require(`
- type condor_server_packet_t;
- ')
-
- allow $1 condor_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_condor_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the couchdb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_couchdb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_couchdb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_couchdb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the couchdb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_couchdb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_couchdb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_couchdb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the couchdb port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_couchdb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_couchdb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_couchdb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the couchdb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_couchdb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_couchdb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_couchdb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the couchdb port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_couchdb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_couchdb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_couchdb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the couchdb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_couchdb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_couchdb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_couchdb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the couchdb port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_couchdb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_couchdb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_couchdb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the couchdb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_couchdb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_couchdb_port'($*)) dnl
-
- gen_require(`
- type couchdb_port_t;
- ')
-
- allow $1 couchdb_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_couchdb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the couchdb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_couchdb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_couchdb_port'($*)) dnl
-
- gen_require(`
- type couchdb_port_t;
- ')
-
- allow $1 couchdb_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_couchdb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the couchdb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_couchdb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_couchdb_port'($*)) dnl
-
- gen_require(`
- type couchdb_port_t;
- ')
-
- allow $1 couchdb_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_couchdb_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send couchdb_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_couchdb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_couchdb_client_packets'($*)) dnl
-
- gen_require(`
- type couchdb_client_packet_t;
- ')
-
- allow $1 couchdb_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_couchdb_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send couchdb_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_couchdb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_couchdb_client_packets'($*)) dnl
-
- gen_require(`
- type couchdb_client_packet_t;
- ')
-
- dontaudit $1 couchdb_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_couchdb_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive couchdb_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_couchdb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_couchdb_client_packets'($*)) dnl
-
- gen_require(`
- type couchdb_client_packet_t;
- ')
-
- allow $1 couchdb_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_couchdb_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive couchdb_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_couchdb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_couchdb_client_packets'($*)) dnl
-
- gen_require(`
- type couchdb_client_packet_t;
- ')
-
- dontaudit $1 couchdb_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_couchdb_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive couchdb_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_couchdb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_couchdb_client_packets'($*)) dnl
-
- corenet_send_couchdb_client_packets($1)
- corenet_receive_couchdb_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_couchdb_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive couchdb_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_couchdb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_couchdb_client_packets'($*)) dnl
-
- corenet_dontaudit_send_couchdb_client_packets($1)
- corenet_dontaudit_receive_couchdb_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_couchdb_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to couchdb_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_couchdb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_couchdb_client_packets'($*)) dnl
-
- gen_require(`
- type couchdb_client_packet_t;
- ')
-
- allow $1 couchdb_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_couchdb_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send couchdb_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_couchdb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_couchdb_server_packets'($*)) dnl
-
- gen_require(`
- type couchdb_server_packet_t;
- ')
-
- allow $1 couchdb_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_couchdb_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send couchdb_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_couchdb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_couchdb_server_packets'($*)) dnl
-
- gen_require(`
- type couchdb_server_packet_t;
- ')
-
- dontaudit $1 couchdb_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_couchdb_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive couchdb_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_couchdb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_couchdb_server_packets'($*)) dnl
-
- gen_require(`
- type couchdb_server_packet_t;
- ')
-
- allow $1 couchdb_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_couchdb_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive couchdb_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_couchdb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_couchdb_server_packets'($*)) dnl
-
- gen_require(`
- type couchdb_server_packet_t;
- ')
-
- dontaudit $1 couchdb_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_couchdb_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive couchdb_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_couchdb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_couchdb_server_packets'($*)) dnl
-
- corenet_send_couchdb_server_packets($1)
- corenet_receive_couchdb_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_couchdb_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive couchdb_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_couchdb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_couchdb_server_packets'($*)) dnl
-
- corenet_dontaudit_send_couchdb_server_packets($1)
- corenet_dontaudit_receive_couchdb_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_couchdb_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to couchdb_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_couchdb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_couchdb_server_packets'($*)) dnl
-
- gen_require(`
- type couchdb_server_packet_t;
- ')
-
- allow $1 couchdb_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_couchdb_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the cslistener port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_cslistener_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_cslistener_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_cslistener_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the cslistener port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_cslistener_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_cslistener_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_cslistener_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the cslistener port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_cslistener_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_cslistener_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_cslistener_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the cslistener port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_cslistener_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_cslistener_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_cslistener_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the cslistener port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_cslistener_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_cslistener_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_cslistener_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the cslistener port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_cslistener_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_cslistener_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_cslistener_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the cslistener port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_cslistener_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_cslistener_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_cslistener_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the cslistener port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_cslistener_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_cslistener_port'($*)) dnl
-
- gen_require(`
- type cslistener_port_t;
- ')
-
- allow $1 cslistener_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_cslistener_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the cslistener port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_cslistener_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_cslistener_port'($*)) dnl
-
- gen_require(`
- type cslistener_port_t;
- ')
-
- allow $1 cslistener_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_cslistener_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the cslistener port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_cslistener_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_cslistener_port'($*)) dnl
-
- gen_require(`
- type cslistener_port_t;
- ')
-
- allow $1 cslistener_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_cslistener_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send cslistener_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_cslistener_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_cslistener_client_packets'($*)) dnl
-
- gen_require(`
- type cslistener_client_packet_t;
- ')
-
- allow $1 cslistener_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_cslistener_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send cslistener_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_cslistener_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_cslistener_client_packets'($*)) dnl
-
- gen_require(`
- type cslistener_client_packet_t;
- ')
-
- dontaudit $1 cslistener_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_cslistener_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive cslistener_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_cslistener_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_cslistener_client_packets'($*)) dnl
-
- gen_require(`
- type cslistener_client_packet_t;
- ')
-
- allow $1 cslistener_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_cslistener_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive cslistener_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_cslistener_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_cslistener_client_packets'($*)) dnl
-
- gen_require(`
- type cslistener_client_packet_t;
- ')
-
- dontaudit $1 cslistener_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_cslistener_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive cslistener_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_cslistener_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_cslistener_client_packets'($*)) dnl
-
- corenet_send_cslistener_client_packets($1)
- corenet_receive_cslistener_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_cslistener_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive cslistener_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_cslistener_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_cslistener_client_packets'($*)) dnl
-
- corenet_dontaudit_send_cslistener_client_packets($1)
- corenet_dontaudit_receive_cslistener_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_cslistener_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to cslistener_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_cslistener_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_cslistener_client_packets'($*)) dnl
-
- gen_require(`
- type cslistener_client_packet_t;
- ')
-
- allow $1 cslistener_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_cslistener_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send cslistener_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_cslistener_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_cslistener_server_packets'($*)) dnl
-
- gen_require(`
- type cslistener_server_packet_t;
- ')
-
- allow $1 cslistener_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_cslistener_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send cslistener_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_cslistener_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_cslistener_server_packets'($*)) dnl
-
- gen_require(`
- type cslistener_server_packet_t;
- ')
-
- dontaudit $1 cslistener_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_cslistener_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive cslistener_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_cslistener_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_cslistener_server_packets'($*)) dnl
-
- gen_require(`
- type cslistener_server_packet_t;
- ')
-
- allow $1 cslistener_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_cslistener_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive cslistener_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_cslistener_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_cslistener_server_packets'($*)) dnl
-
- gen_require(`
- type cslistener_server_packet_t;
- ')
-
- dontaudit $1 cslistener_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_cslistener_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive cslistener_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_cslistener_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_cslistener_server_packets'($*)) dnl
-
- corenet_send_cslistener_server_packets($1)
- corenet_receive_cslistener_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_cslistener_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive cslistener_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_cslistener_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_cslistener_server_packets'($*)) dnl
-
- corenet_dontaudit_send_cslistener_server_packets($1)
- corenet_dontaudit_receive_cslistener_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_cslistener_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to cslistener_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_cslistener_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_cslistener_server_packets'($*)) dnl
-
- gen_require(`
- type cslistener_server_packet_t;
- ')
-
- allow $1 cslistener_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_cslistener_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the ctdb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_ctdb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ctdb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ctdb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the ctdb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_ctdb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ctdb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_ctdb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the ctdb port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_ctdb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ctdb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ctdb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the ctdb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_ctdb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ctdb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ctdb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the ctdb port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_ctdb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ctdb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ctdb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the ctdb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_ctdb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ctdb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ctdb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the ctdb port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_ctdb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ctdb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ctdb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the ctdb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_ctdb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ctdb_port'($*)) dnl
-
- gen_require(`
- type ctdb_port_t;
- ')
-
- allow $1 ctdb_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ctdb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the ctdb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_ctdb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ctdb_port'($*)) dnl
-
- gen_require(`
- type ctdb_port_t;
- ')
-
- allow $1 ctdb_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ctdb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the ctdb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_ctdb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ctdb_port'($*)) dnl
-
- gen_require(`
- type ctdb_port_t;
- ')
-
- allow $1 ctdb_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ctdb_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ctdb_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ctdb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ctdb_client_packets'($*)) dnl
-
- gen_require(`
- type ctdb_client_packet_t;
- ')
-
- allow $1 ctdb_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ctdb_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ctdb_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ctdb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ctdb_client_packets'($*)) dnl
-
- gen_require(`
- type ctdb_client_packet_t;
- ')
-
- dontaudit $1 ctdb_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ctdb_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ctdb_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ctdb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ctdb_client_packets'($*)) dnl
-
- gen_require(`
- type ctdb_client_packet_t;
- ')
-
- allow $1 ctdb_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ctdb_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ctdb_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ctdb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ctdb_client_packets'($*)) dnl
-
- gen_require(`
- type ctdb_client_packet_t;
- ')
-
- dontaudit $1 ctdb_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ctdb_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ctdb_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ctdb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ctdb_client_packets'($*)) dnl
-
- corenet_send_ctdb_client_packets($1)
- corenet_receive_ctdb_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ctdb_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ctdb_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ctdb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ctdb_client_packets'($*)) dnl
-
- corenet_dontaudit_send_ctdb_client_packets($1)
- corenet_dontaudit_receive_ctdb_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ctdb_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ctdb_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ctdb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ctdb_client_packets'($*)) dnl
-
- gen_require(`
- type ctdb_client_packet_t;
- ')
-
- allow $1 ctdb_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ctdb_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ctdb_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ctdb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ctdb_server_packets'($*)) dnl
-
- gen_require(`
- type ctdb_server_packet_t;
- ')
-
- allow $1 ctdb_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ctdb_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ctdb_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ctdb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ctdb_server_packets'($*)) dnl
-
- gen_require(`
- type ctdb_server_packet_t;
- ')
-
- dontaudit $1 ctdb_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ctdb_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ctdb_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ctdb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ctdb_server_packets'($*)) dnl
-
- gen_require(`
- type ctdb_server_packet_t;
- ')
-
- allow $1 ctdb_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ctdb_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ctdb_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ctdb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ctdb_server_packets'($*)) dnl
-
- gen_require(`
- type ctdb_server_packet_t;
- ')
-
- dontaudit $1 ctdb_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ctdb_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ctdb_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ctdb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ctdb_server_packets'($*)) dnl
-
- corenet_send_ctdb_server_packets($1)
- corenet_receive_ctdb_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ctdb_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ctdb_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ctdb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ctdb_server_packets'($*)) dnl
-
- corenet_dontaudit_send_ctdb_server_packets($1)
- corenet_dontaudit_receive_ctdb_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ctdb_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ctdb_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ctdb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ctdb_server_packets'($*)) dnl
-
- gen_require(`
- type ctdb_server_packet_t;
- ')
-
- allow $1 ctdb_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ctdb_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the cvs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_cvs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_cvs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_cvs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the cvs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_cvs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_cvs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_cvs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the cvs port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_cvs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_cvs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_cvs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the cvs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_cvs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_cvs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_cvs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the cvs port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_cvs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_cvs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_cvs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the cvs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_cvs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_cvs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_cvs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the cvs port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_cvs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_cvs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_cvs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the cvs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_cvs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_cvs_port'($*)) dnl
-
- gen_require(`
- type cvs_port_t;
- ')
-
- allow $1 cvs_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_cvs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the cvs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_cvs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_cvs_port'($*)) dnl
-
- gen_require(`
- type cvs_port_t;
- ')
-
- allow $1 cvs_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_cvs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the cvs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_cvs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_cvs_port'($*)) dnl
-
- gen_require(`
- type cvs_port_t;
- ')
-
- allow $1 cvs_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_cvs_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send cvs_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_cvs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_cvs_client_packets'($*)) dnl
-
- gen_require(`
- type cvs_client_packet_t;
- ')
-
- allow $1 cvs_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_cvs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send cvs_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_cvs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_cvs_client_packets'($*)) dnl
-
- gen_require(`
- type cvs_client_packet_t;
- ')
-
- dontaudit $1 cvs_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_cvs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive cvs_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_cvs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_cvs_client_packets'($*)) dnl
-
- gen_require(`
- type cvs_client_packet_t;
- ')
-
- allow $1 cvs_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_cvs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive cvs_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_cvs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_cvs_client_packets'($*)) dnl
-
- gen_require(`
- type cvs_client_packet_t;
- ')
-
- dontaudit $1 cvs_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_cvs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive cvs_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_cvs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_cvs_client_packets'($*)) dnl
-
- corenet_send_cvs_client_packets($1)
- corenet_receive_cvs_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_cvs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive cvs_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_cvs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_cvs_client_packets'($*)) dnl
-
- corenet_dontaudit_send_cvs_client_packets($1)
- corenet_dontaudit_receive_cvs_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_cvs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to cvs_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_cvs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_cvs_client_packets'($*)) dnl
-
- gen_require(`
- type cvs_client_packet_t;
- ')
-
- allow $1 cvs_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_cvs_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send cvs_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_cvs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_cvs_server_packets'($*)) dnl
-
- gen_require(`
- type cvs_server_packet_t;
- ')
-
- allow $1 cvs_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_cvs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send cvs_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_cvs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_cvs_server_packets'($*)) dnl
-
- gen_require(`
- type cvs_server_packet_t;
- ')
-
- dontaudit $1 cvs_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_cvs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive cvs_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_cvs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_cvs_server_packets'($*)) dnl
-
- gen_require(`
- type cvs_server_packet_t;
- ')
-
- allow $1 cvs_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_cvs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive cvs_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_cvs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_cvs_server_packets'($*)) dnl
-
- gen_require(`
- type cvs_server_packet_t;
- ')
-
- dontaudit $1 cvs_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_cvs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive cvs_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_cvs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_cvs_server_packets'($*)) dnl
-
- corenet_send_cvs_server_packets($1)
- corenet_receive_cvs_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_cvs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive cvs_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_cvs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_cvs_server_packets'($*)) dnl
-
- corenet_dontaudit_send_cvs_server_packets($1)
- corenet_dontaudit_receive_cvs_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_cvs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to cvs_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_cvs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_cvs_server_packets'($*)) dnl
-
- gen_require(`
- type cvs_server_packet_t;
- ')
-
- allow $1 cvs_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_cvs_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the cyphesis port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_cyphesis_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_cyphesis_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_cyphesis_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the cyphesis port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_cyphesis_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_cyphesis_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_cyphesis_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the cyphesis port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_cyphesis_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_cyphesis_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_cyphesis_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the cyphesis port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_cyphesis_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_cyphesis_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_cyphesis_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the cyphesis port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_cyphesis_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_cyphesis_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_cyphesis_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the cyphesis port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_cyphesis_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_cyphesis_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_cyphesis_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the cyphesis port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_cyphesis_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_cyphesis_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_cyphesis_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the cyphesis port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_cyphesis_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_cyphesis_port'($*)) dnl
-
- gen_require(`
- type cyphesis_port_t;
- ')
-
- allow $1 cyphesis_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_cyphesis_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the cyphesis port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_cyphesis_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_cyphesis_port'($*)) dnl
-
- gen_require(`
- type cyphesis_port_t;
- ')
-
- allow $1 cyphesis_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_cyphesis_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the cyphesis port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_cyphesis_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_cyphesis_port'($*)) dnl
-
- gen_require(`
- type cyphesis_port_t;
- ')
-
- allow $1 cyphesis_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_cyphesis_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send cyphesis_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_cyphesis_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_cyphesis_client_packets'($*)) dnl
-
- gen_require(`
- type cyphesis_client_packet_t;
- ')
-
- allow $1 cyphesis_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_cyphesis_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send cyphesis_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_cyphesis_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_cyphesis_client_packets'($*)) dnl
-
- gen_require(`
- type cyphesis_client_packet_t;
- ')
-
- dontaudit $1 cyphesis_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_cyphesis_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive cyphesis_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_cyphesis_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_cyphesis_client_packets'($*)) dnl
-
- gen_require(`
- type cyphesis_client_packet_t;
- ')
-
- allow $1 cyphesis_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_cyphesis_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive cyphesis_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_cyphesis_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_cyphesis_client_packets'($*)) dnl
-
- gen_require(`
- type cyphesis_client_packet_t;
- ')
-
- dontaudit $1 cyphesis_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_cyphesis_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive cyphesis_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_cyphesis_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_cyphesis_client_packets'($*)) dnl
-
- corenet_send_cyphesis_client_packets($1)
- corenet_receive_cyphesis_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_cyphesis_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive cyphesis_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_cyphesis_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_cyphesis_client_packets'($*)) dnl
-
- corenet_dontaudit_send_cyphesis_client_packets($1)
- corenet_dontaudit_receive_cyphesis_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_cyphesis_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to cyphesis_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_cyphesis_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_cyphesis_client_packets'($*)) dnl
-
- gen_require(`
- type cyphesis_client_packet_t;
- ')
-
- allow $1 cyphesis_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_cyphesis_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send cyphesis_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_cyphesis_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_cyphesis_server_packets'($*)) dnl
-
- gen_require(`
- type cyphesis_server_packet_t;
- ')
-
- allow $1 cyphesis_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_cyphesis_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send cyphesis_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_cyphesis_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_cyphesis_server_packets'($*)) dnl
-
- gen_require(`
- type cyphesis_server_packet_t;
- ')
-
- dontaudit $1 cyphesis_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_cyphesis_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive cyphesis_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_cyphesis_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_cyphesis_server_packets'($*)) dnl
-
- gen_require(`
- type cyphesis_server_packet_t;
- ')
-
- allow $1 cyphesis_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_cyphesis_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive cyphesis_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_cyphesis_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_cyphesis_server_packets'($*)) dnl
-
- gen_require(`
- type cyphesis_server_packet_t;
- ')
-
- dontaudit $1 cyphesis_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_cyphesis_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive cyphesis_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_cyphesis_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_cyphesis_server_packets'($*)) dnl
-
- corenet_send_cyphesis_server_packets($1)
- corenet_receive_cyphesis_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_cyphesis_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive cyphesis_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_cyphesis_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_cyphesis_server_packets'($*)) dnl
-
- corenet_dontaudit_send_cyphesis_server_packets($1)
- corenet_dontaudit_receive_cyphesis_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_cyphesis_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to cyphesis_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_cyphesis_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_cyphesis_server_packets'($*)) dnl
-
- gen_require(`
- type cyphesis_server_packet_t;
- ')
-
- allow $1 cyphesis_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_cyphesis_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the daap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_daap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_daap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_daap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the daap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_daap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_daap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_daap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the daap port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_daap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_daap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_daap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the daap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_daap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_daap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_daap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the daap port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_daap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_daap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_daap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the daap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_daap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_daap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_daap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the daap port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_daap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_daap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_daap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the daap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_daap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_daap_port'($*)) dnl
-
- gen_require(`
- type daap_port_t;
- ')
-
- allow $1 daap_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_daap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the daap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_daap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_daap_port'($*)) dnl
-
- gen_require(`
- type daap_port_t;
- ')
-
- allow $1 daap_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_daap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the daap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_daap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_daap_port'($*)) dnl
-
- gen_require(`
- type daap_port_t;
- ')
-
- allow $1 daap_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_daap_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send daap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_daap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_daap_client_packets'($*)) dnl
-
- gen_require(`
- type daap_client_packet_t;
- ')
-
- allow $1 daap_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_daap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send daap_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_daap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_daap_client_packets'($*)) dnl
-
- gen_require(`
- type daap_client_packet_t;
- ')
-
- dontaudit $1 daap_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_daap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive daap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_daap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_daap_client_packets'($*)) dnl
-
- gen_require(`
- type daap_client_packet_t;
- ')
-
- allow $1 daap_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_daap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive daap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_daap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_daap_client_packets'($*)) dnl
-
- gen_require(`
- type daap_client_packet_t;
- ')
-
- dontaudit $1 daap_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_daap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive daap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_daap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_daap_client_packets'($*)) dnl
-
- corenet_send_daap_client_packets($1)
- corenet_receive_daap_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_daap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive daap_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_daap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_daap_client_packets'($*)) dnl
-
- corenet_dontaudit_send_daap_client_packets($1)
- corenet_dontaudit_receive_daap_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_daap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to daap_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_daap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_daap_client_packets'($*)) dnl
-
- gen_require(`
- type daap_client_packet_t;
- ')
-
- allow $1 daap_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_daap_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send daap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_daap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_daap_server_packets'($*)) dnl
-
- gen_require(`
- type daap_server_packet_t;
- ')
-
- allow $1 daap_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_daap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send daap_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_daap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_daap_server_packets'($*)) dnl
-
- gen_require(`
- type daap_server_packet_t;
- ')
-
- dontaudit $1 daap_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_daap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive daap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_daap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_daap_server_packets'($*)) dnl
-
- gen_require(`
- type daap_server_packet_t;
- ')
-
- allow $1 daap_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_daap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive daap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_daap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_daap_server_packets'($*)) dnl
-
- gen_require(`
- type daap_server_packet_t;
- ')
-
- dontaudit $1 daap_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_daap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive daap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_daap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_daap_server_packets'($*)) dnl
-
- corenet_send_daap_server_packets($1)
- corenet_receive_daap_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_daap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive daap_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_daap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_daap_server_packets'($*)) dnl
-
- corenet_dontaudit_send_daap_server_packets($1)
- corenet_dontaudit_receive_daap_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_daap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to daap_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_daap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_daap_server_packets'($*)) dnl
-
- gen_require(`
- type daap_server_packet_t;
- ')
-
- allow $1 daap_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_daap_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the dbskkd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_dbskkd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_dbskkd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_dbskkd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the dbskkd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_dbskkd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_dbskkd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_dbskkd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the dbskkd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_dbskkd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_dbskkd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_dbskkd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the dbskkd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_dbskkd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_dbskkd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_dbskkd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the dbskkd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_dbskkd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_dbskkd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_dbskkd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the dbskkd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_dbskkd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_dbskkd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_dbskkd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the dbskkd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_dbskkd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_dbskkd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_dbskkd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the dbskkd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_dbskkd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_dbskkd_port'($*)) dnl
-
- gen_require(`
- type dbskkd_port_t;
- ')
-
- allow $1 dbskkd_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_dbskkd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the dbskkd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_dbskkd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_dbskkd_port'($*)) dnl
-
- gen_require(`
- type dbskkd_port_t;
- ')
-
- allow $1 dbskkd_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_dbskkd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the dbskkd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_dbskkd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_dbskkd_port'($*)) dnl
-
- gen_require(`
- type dbskkd_port_t;
- ')
-
- allow $1 dbskkd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_dbskkd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send dbskkd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_dbskkd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_dbskkd_client_packets'($*)) dnl
-
- gen_require(`
- type dbskkd_client_packet_t;
- ')
-
- allow $1 dbskkd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_dbskkd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send dbskkd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_dbskkd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dbskkd_client_packets'($*)) dnl
-
- gen_require(`
- type dbskkd_client_packet_t;
- ')
-
- dontaudit $1 dbskkd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dbskkd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive dbskkd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_dbskkd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_dbskkd_client_packets'($*)) dnl
-
- gen_require(`
- type dbskkd_client_packet_t;
- ')
-
- allow $1 dbskkd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_dbskkd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive dbskkd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_dbskkd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dbskkd_client_packets'($*)) dnl
-
- gen_require(`
- type dbskkd_client_packet_t;
- ')
-
- dontaudit $1 dbskkd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dbskkd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive dbskkd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_dbskkd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dbskkd_client_packets'($*)) dnl
-
- corenet_send_dbskkd_client_packets($1)
- corenet_receive_dbskkd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dbskkd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive dbskkd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_dbskkd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dbskkd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_dbskkd_client_packets($1)
- corenet_dontaudit_receive_dbskkd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dbskkd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to dbskkd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_dbskkd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dbskkd_client_packets'($*)) dnl
-
- gen_require(`
- type dbskkd_client_packet_t;
- ')
-
- allow $1 dbskkd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_dbskkd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send dbskkd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_dbskkd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_dbskkd_server_packets'($*)) dnl
-
- gen_require(`
- type dbskkd_server_packet_t;
- ')
-
- allow $1 dbskkd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_dbskkd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send dbskkd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_dbskkd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dbskkd_server_packets'($*)) dnl
-
- gen_require(`
- type dbskkd_server_packet_t;
- ')
-
- dontaudit $1 dbskkd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dbskkd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive dbskkd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_dbskkd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_dbskkd_server_packets'($*)) dnl
-
- gen_require(`
- type dbskkd_server_packet_t;
- ')
-
- allow $1 dbskkd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_dbskkd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive dbskkd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_dbskkd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dbskkd_server_packets'($*)) dnl
-
- gen_require(`
- type dbskkd_server_packet_t;
- ')
-
- dontaudit $1 dbskkd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dbskkd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive dbskkd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_dbskkd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dbskkd_server_packets'($*)) dnl
-
- corenet_send_dbskkd_server_packets($1)
- corenet_receive_dbskkd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dbskkd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive dbskkd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_dbskkd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dbskkd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_dbskkd_server_packets($1)
- corenet_dontaudit_receive_dbskkd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dbskkd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to dbskkd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_dbskkd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dbskkd_server_packets'($*)) dnl
-
- gen_require(`
- type dbskkd_server_packet_t;
- ')
-
- allow $1 dbskkd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_dbskkd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the dcc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_dcc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_dcc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_dcc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the dcc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_dcc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_dcc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_dcc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the dcc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_dcc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_dcc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_dcc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the dcc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_dcc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_dcc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_dcc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the dcc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_dcc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_dcc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_dcc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the dcc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_dcc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_dcc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_dcc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the dcc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_dcc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_dcc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_dcc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the dcc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_dcc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_dcc_port'($*)) dnl
-
- gen_require(`
- type dcc_port_t;
- ')
-
- allow $1 dcc_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_dcc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the dcc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_dcc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_dcc_port'($*)) dnl
-
- gen_require(`
- type dcc_port_t;
- ')
-
- allow $1 dcc_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_dcc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the dcc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_dcc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_dcc_port'($*)) dnl
-
- gen_require(`
- type dcc_port_t;
- ')
-
- allow $1 dcc_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_dcc_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send dcc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_dcc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_dcc_client_packets'($*)) dnl
-
- gen_require(`
- type dcc_client_packet_t;
- ')
-
- allow $1 dcc_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_dcc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send dcc_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_dcc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dcc_client_packets'($*)) dnl
-
- gen_require(`
- type dcc_client_packet_t;
- ')
-
- dontaudit $1 dcc_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dcc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive dcc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_dcc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_dcc_client_packets'($*)) dnl
-
- gen_require(`
- type dcc_client_packet_t;
- ')
-
- allow $1 dcc_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_dcc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive dcc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_dcc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dcc_client_packets'($*)) dnl
-
- gen_require(`
- type dcc_client_packet_t;
- ')
-
- dontaudit $1 dcc_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dcc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive dcc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_dcc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dcc_client_packets'($*)) dnl
-
- corenet_send_dcc_client_packets($1)
- corenet_receive_dcc_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dcc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive dcc_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_dcc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dcc_client_packets'($*)) dnl
-
- corenet_dontaudit_send_dcc_client_packets($1)
- corenet_dontaudit_receive_dcc_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dcc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to dcc_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_dcc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dcc_client_packets'($*)) dnl
-
- gen_require(`
- type dcc_client_packet_t;
- ')
-
- allow $1 dcc_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_dcc_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send dcc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_dcc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_dcc_server_packets'($*)) dnl
-
- gen_require(`
- type dcc_server_packet_t;
- ')
-
- allow $1 dcc_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_dcc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send dcc_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_dcc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dcc_server_packets'($*)) dnl
-
- gen_require(`
- type dcc_server_packet_t;
- ')
-
- dontaudit $1 dcc_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dcc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive dcc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_dcc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_dcc_server_packets'($*)) dnl
-
- gen_require(`
- type dcc_server_packet_t;
- ')
-
- allow $1 dcc_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_dcc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive dcc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_dcc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dcc_server_packets'($*)) dnl
-
- gen_require(`
- type dcc_server_packet_t;
- ')
-
- dontaudit $1 dcc_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dcc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive dcc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_dcc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dcc_server_packets'($*)) dnl
-
- corenet_send_dcc_server_packets($1)
- corenet_receive_dcc_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dcc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive dcc_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_dcc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dcc_server_packets'($*)) dnl
-
- corenet_dontaudit_send_dcc_server_packets($1)
- corenet_dontaudit_receive_dcc_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dcc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to dcc_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_dcc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dcc_server_packets'($*)) dnl
-
- gen_require(`
- type dcc_server_packet_t;
- ')
-
- allow $1 dcc_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_dcc_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the dccm port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_dccm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_dccm_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_dccm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the dccm port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_dccm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_dccm_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_dccm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the dccm port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_dccm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_dccm_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_dccm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the dccm port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_dccm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_dccm_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_dccm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the dccm port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_dccm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_dccm_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_dccm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the dccm port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_dccm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_dccm_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_dccm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the dccm port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_dccm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_dccm_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_dccm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the dccm port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_dccm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_dccm_port'($*)) dnl
-
- gen_require(`
- type dccm_port_t;
- ')
-
- allow $1 dccm_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_dccm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the dccm port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_dccm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_dccm_port'($*)) dnl
-
- gen_require(`
- type dccm_port_t;
- ')
-
- allow $1 dccm_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_dccm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the dccm port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_dccm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_dccm_port'($*)) dnl
-
- gen_require(`
- type dccm_port_t;
- ')
-
- allow $1 dccm_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_dccm_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send dccm_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_dccm_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_dccm_client_packets'($*)) dnl
-
- gen_require(`
- type dccm_client_packet_t;
- ')
-
- allow $1 dccm_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_dccm_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send dccm_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_dccm_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dccm_client_packets'($*)) dnl
-
- gen_require(`
- type dccm_client_packet_t;
- ')
-
- dontaudit $1 dccm_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dccm_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive dccm_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_dccm_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_dccm_client_packets'($*)) dnl
-
- gen_require(`
- type dccm_client_packet_t;
- ')
-
- allow $1 dccm_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_dccm_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive dccm_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_dccm_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dccm_client_packets'($*)) dnl
-
- gen_require(`
- type dccm_client_packet_t;
- ')
-
- dontaudit $1 dccm_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dccm_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive dccm_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_dccm_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dccm_client_packets'($*)) dnl
-
- corenet_send_dccm_client_packets($1)
- corenet_receive_dccm_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dccm_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive dccm_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_dccm_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dccm_client_packets'($*)) dnl
-
- corenet_dontaudit_send_dccm_client_packets($1)
- corenet_dontaudit_receive_dccm_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dccm_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to dccm_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_dccm_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dccm_client_packets'($*)) dnl
-
- gen_require(`
- type dccm_client_packet_t;
- ')
-
- allow $1 dccm_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_dccm_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send dccm_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_dccm_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_dccm_server_packets'($*)) dnl
-
- gen_require(`
- type dccm_server_packet_t;
- ')
-
- allow $1 dccm_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_dccm_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send dccm_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_dccm_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dccm_server_packets'($*)) dnl
-
- gen_require(`
- type dccm_server_packet_t;
- ')
-
- dontaudit $1 dccm_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dccm_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive dccm_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_dccm_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_dccm_server_packets'($*)) dnl
-
- gen_require(`
- type dccm_server_packet_t;
- ')
-
- allow $1 dccm_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_dccm_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive dccm_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_dccm_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dccm_server_packets'($*)) dnl
-
- gen_require(`
- type dccm_server_packet_t;
- ')
-
- dontaudit $1 dccm_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dccm_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive dccm_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_dccm_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dccm_server_packets'($*)) dnl
-
- corenet_send_dccm_server_packets($1)
- corenet_receive_dccm_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dccm_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive dccm_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_dccm_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dccm_server_packets'($*)) dnl
-
- corenet_dontaudit_send_dccm_server_packets($1)
- corenet_dontaudit_receive_dccm_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dccm_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to dccm_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_dccm_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dccm_server_packets'($*)) dnl
-
- gen_require(`
- type dccm_server_packet_t;
- ')
-
- allow $1 dccm_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_dccm_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the dhcpc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_dhcpc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_dhcpc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_dhcpc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the dhcpc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_dhcpc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_dhcpc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_dhcpc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the dhcpc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_dhcpc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_dhcpc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_dhcpc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the dhcpc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_dhcpc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_dhcpc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_dhcpc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the dhcpc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_dhcpc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_dhcpc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_dhcpc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the dhcpc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_dhcpc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_dhcpc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_dhcpc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the dhcpc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_dhcpc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_dhcpc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_dhcpc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the dhcpc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_dhcpc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_dhcpc_port'($*)) dnl
-
- gen_require(`
- type dhcpc_port_t;
- ')
-
- allow $1 dhcpc_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_dhcpc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the dhcpc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_dhcpc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_dhcpc_port'($*)) dnl
-
- gen_require(`
- type dhcpc_port_t;
- ')
-
- allow $1 dhcpc_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_dhcpc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the dhcpc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_dhcpc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_dhcpc_port'($*)) dnl
-
- gen_require(`
- type dhcpc_port_t;
- ')
-
- allow $1 dhcpc_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_dhcpc_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send dhcpc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_dhcpc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_dhcpc_client_packets'($*)) dnl
-
- gen_require(`
- type dhcpc_client_packet_t;
- ')
-
- allow $1 dhcpc_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_dhcpc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send dhcpc_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_dhcpc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dhcpc_client_packets'($*)) dnl
-
- gen_require(`
- type dhcpc_client_packet_t;
- ')
-
- dontaudit $1 dhcpc_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dhcpc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive dhcpc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_dhcpc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_dhcpc_client_packets'($*)) dnl
-
- gen_require(`
- type dhcpc_client_packet_t;
- ')
-
- allow $1 dhcpc_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_dhcpc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive dhcpc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_dhcpc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dhcpc_client_packets'($*)) dnl
-
- gen_require(`
- type dhcpc_client_packet_t;
- ')
-
- dontaudit $1 dhcpc_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dhcpc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive dhcpc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_dhcpc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dhcpc_client_packets'($*)) dnl
-
- corenet_send_dhcpc_client_packets($1)
- corenet_receive_dhcpc_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dhcpc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive dhcpc_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_dhcpc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dhcpc_client_packets'($*)) dnl
-
- corenet_dontaudit_send_dhcpc_client_packets($1)
- corenet_dontaudit_receive_dhcpc_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dhcpc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to dhcpc_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_dhcpc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dhcpc_client_packets'($*)) dnl
-
- gen_require(`
- type dhcpc_client_packet_t;
- ')
-
- allow $1 dhcpc_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_dhcpc_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send dhcpc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_dhcpc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_dhcpc_server_packets'($*)) dnl
-
- gen_require(`
- type dhcpc_server_packet_t;
- ')
-
- allow $1 dhcpc_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_dhcpc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send dhcpc_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_dhcpc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dhcpc_server_packets'($*)) dnl
-
- gen_require(`
- type dhcpc_server_packet_t;
- ')
-
- dontaudit $1 dhcpc_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dhcpc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive dhcpc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_dhcpc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_dhcpc_server_packets'($*)) dnl
-
- gen_require(`
- type dhcpc_server_packet_t;
- ')
-
- allow $1 dhcpc_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_dhcpc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive dhcpc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_dhcpc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dhcpc_server_packets'($*)) dnl
-
- gen_require(`
- type dhcpc_server_packet_t;
- ')
-
- dontaudit $1 dhcpc_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dhcpc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive dhcpc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_dhcpc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dhcpc_server_packets'($*)) dnl
-
- corenet_send_dhcpc_server_packets($1)
- corenet_receive_dhcpc_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dhcpc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive dhcpc_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_dhcpc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dhcpc_server_packets'($*)) dnl
-
- corenet_dontaudit_send_dhcpc_server_packets($1)
- corenet_dontaudit_receive_dhcpc_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dhcpc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to dhcpc_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_dhcpc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dhcpc_server_packets'($*)) dnl
-
- gen_require(`
- type dhcpc_server_packet_t;
- ')
-
- allow $1 dhcpc_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_dhcpc_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the dhcpd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_dhcpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_dhcpd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_dhcpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the dhcpd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_dhcpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_dhcpd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_dhcpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the dhcpd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_dhcpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_dhcpd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_dhcpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the dhcpd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_dhcpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_dhcpd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_dhcpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the dhcpd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_dhcpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_dhcpd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_dhcpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the dhcpd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_dhcpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_dhcpd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_dhcpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the dhcpd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_dhcpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_dhcpd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_dhcpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the dhcpd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_dhcpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_dhcpd_port'($*)) dnl
-
- gen_require(`
- type dhcpd_port_t;
- ')
-
- allow $1 dhcpd_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_dhcpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the dhcpd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_dhcpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_dhcpd_port'($*)) dnl
-
- gen_require(`
- type dhcpd_port_t;
- ')
-
- allow $1 dhcpd_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_dhcpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the dhcpd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_dhcpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_dhcpd_port'($*)) dnl
-
- gen_require(`
- type dhcpd_port_t;
- ')
-
- allow $1 dhcpd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_dhcpd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send dhcpd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_dhcpd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_dhcpd_client_packets'($*)) dnl
-
- gen_require(`
- type dhcpd_client_packet_t;
- ')
-
- allow $1 dhcpd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_dhcpd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send dhcpd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_dhcpd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dhcpd_client_packets'($*)) dnl
-
- gen_require(`
- type dhcpd_client_packet_t;
- ')
-
- dontaudit $1 dhcpd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dhcpd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive dhcpd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_dhcpd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_dhcpd_client_packets'($*)) dnl
-
- gen_require(`
- type dhcpd_client_packet_t;
- ')
-
- allow $1 dhcpd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_dhcpd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive dhcpd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_dhcpd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dhcpd_client_packets'($*)) dnl
-
- gen_require(`
- type dhcpd_client_packet_t;
- ')
-
- dontaudit $1 dhcpd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dhcpd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive dhcpd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_dhcpd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dhcpd_client_packets'($*)) dnl
-
- corenet_send_dhcpd_client_packets($1)
- corenet_receive_dhcpd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dhcpd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive dhcpd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_dhcpd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dhcpd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_dhcpd_client_packets($1)
- corenet_dontaudit_receive_dhcpd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dhcpd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to dhcpd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_dhcpd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dhcpd_client_packets'($*)) dnl
-
- gen_require(`
- type dhcpd_client_packet_t;
- ')
-
- allow $1 dhcpd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_dhcpd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send dhcpd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_dhcpd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_dhcpd_server_packets'($*)) dnl
-
- gen_require(`
- type dhcpd_server_packet_t;
- ')
-
- allow $1 dhcpd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_dhcpd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send dhcpd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_dhcpd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dhcpd_server_packets'($*)) dnl
-
- gen_require(`
- type dhcpd_server_packet_t;
- ')
-
- dontaudit $1 dhcpd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dhcpd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive dhcpd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_dhcpd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_dhcpd_server_packets'($*)) dnl
-
- gen_require(`
- type dhcpd_server_packet_t;
- ')
-
- allow $1 dhcpd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_dhcpd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive dhcpd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_dhcpd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dhcpd_server_packets'($*)) dnl
-
- gen_require(`
- type dhcpd_server_packet_t;
- ')
-
- dontaudit $1 dhcpd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dhcpd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive dhcpd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_dhcpd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dhcpd_server_packets'($*)) dnl
-
- corenet_send_dhcpd_server_packets($1)
- corenet_receive_dhcpd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dhcpd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive dhcpd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_dhcpd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dhcpd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_dhcpd_server_packets($1)
- corenet_dontaudit_receive_dhcpd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dhcpd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to dhcpd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_dhcpd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dhcpd_server_packets'($*)) dnl
-
- gen_require(`
- type dhcpd_server_packet_t;
- ')
-
- allow $1 dhcpd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_dhcpd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the dict port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_dict_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_dict_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_dict_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the dict port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_dict_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_dict_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_dict_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the dict port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_dict_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_dict_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_dict_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the dict port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_dict_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_dict_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_dict_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the dict port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_dict_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_dict_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_dict_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the dict port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_dict_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_dict_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_dict_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the dict port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_dict_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_dict_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_dict_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the dict port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_dict_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_dict_port'($*)) dnl
-
- gen_require(`
- type dict_port_t;
- ')
-
- allow $1 dict_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_dict_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the dict port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_dict_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_dict_port'($*)) dnl
-
- gen_require(`
- type dict_port_t;
- ')
-
- allow $1 dict_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_dict_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the dict port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_dict_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_dict_port'($*)) dnl
-
- gen_require(`
- type dict_port_t;
- ')
-
- allow $1 dict_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_dict_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send dict_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_dict_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_dict_client_packets'($*)) dnl
-
- gen_require(`
- type dict_client_packet_t;
- ')
-
- allow $1 dict_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_dict_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send dict_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_dict_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dict_client_packets'($*)) dnl
-
- gen_require(`
- type dict_client_packet_t;
- ')
-
- dontaudit $1 dict_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dict_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive dict_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_dict_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_dict_client_packets'($*)) dnl
-
- gen_require(`
- type dict_client_packet_t;
- ')
-
- allow $1 dict_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_dict_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive dict_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_dict_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dict_client_packets'($*)) dnl
-
- gen_require(`
- type dict_client_packet_t;
- ')
-
- dontaudit $1 dict_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dict_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive dict_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_dict_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dict_client_packets'($*)) dnl
-
- corenet_send_dict_client_packets($1)
- corenet_receive_dict_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dict_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive dict_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_dict_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dict_client_packets'($*)) dnl
-
- corenet_dontaudit_send_dict_client_packets($1)
- corenet_dontaudit_receive_dict_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dict_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to dict_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_dict_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dict_client_packets'($*)) dnl
-
- gen_require(`
- type dict_client_packet_t;
- ')
-
- allow $1 dict_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_dict_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send dict_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_dict_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_dict_server_packets'($*)) dnl
-
- gen_require(`
- type dict_server_packet_t;
- ')
-
- allow $1 dict_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_dict_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send dict_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_dict_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dict_server_packets'($*)) dnl
-
- gen_require(`
- type dict_server_packet_t;
- ')
-
- dontaudit $1 dict_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dict_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive dict_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_dict_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_dict_server_packets'($*)) dnl
-
- gen_require(`
- type dict_server_packet_t;
- ')
-
- allow $1 dict_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_dict_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive dict_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_dict_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dict_server_packets'($*)) dnl
-
- gen_require(`
- type dict_server_packet_t;
- ')
-
- dontaudit $1 dict_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dict_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive dict_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_dict_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dict_server_packets'($*)) dnl
-
- corenet_send_dict_server_packets($1)
- corenet_receive_dict_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dict_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive dict_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_dict_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dict_server_packets'($*)) dnl
-
- corenet_dontaudit_send_dict_server_packets($1)
- corenet_dontaudit_receive_dict_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dict_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to dict_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_dict_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dict_server_packets'($*)) dnl
-
- gen_require(`
- type dict_server_packet_t;
- ')
-
- allow $1 dict_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_dict_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the distccd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_distccd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_distccd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_distccd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the distccd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_distccd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_distccd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_distccd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the distccd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_distccd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_distccd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_distccd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the distccd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_distccd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_distccd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_distccd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the distccd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_distccd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_distccd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_distccd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the distccd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_distccd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_distccd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_distccd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the distccd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_distccd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_distccd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_distccd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the distccd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_distccd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_distccd_port'($*)) dnl
-
- gen_require(`
- type distccd_port_t;
- ')
-
- allow $1 distccd_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_distccd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the distccd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_distccd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_distccd_port'($*)) dnl
-
- gen_require(`
- type distccd_port_t;
- ')
-
- allow $1 distccd_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_distccd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the distccd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_distccd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_distccd_port'($*)) dnl
-
- gen_require(`
- type distccd_port_t;
- ')
-
- allow $1 distccd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_distccd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send distccd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_distccd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_distccd_client_packets'($*)) dnl
-
- gen_require(`
- type distccd_client_packet_t;
- ')
-
- allow $1 distccd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_distccd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send distccd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_distccd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_distccd_client_packets'($*)) dnl
-
- gen_require(`
- type distccd_client_packet_t;
- ')
-
- dontaudit $1 distccd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_distccd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive distccd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_distccd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_distccd_client_packets'($*)) dnl
-
- gen_require(`
- type distccd_client_packet_t;
- ')
-
- allow $1 distccd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_distccd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive distccd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_distccd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_distccd_client_packets'($*)) dnl
-
- gen_require(`
- type distccd_client_packet_t;
- ')
-
- dontaudit $1 distccd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_distccd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive distccd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_distccd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_distccd_client_packets'($*)) dnl
-
- corenet_send_distccd_client_packets($1)
- corenet_receive_distccd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_distccd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive distccd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_distccd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_distccd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_distccd_client_packets($1)
- corenet_dontaudit_receive_distccd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_distccd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to distccd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_distccd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_distccd_client_packets'($*)) dnl
-
- gen_require(`
- type distccd_client_packet_t;
- ')
-
- allow $1 distccd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_distccd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send distccd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_distccd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_distccd_server_packets'($*)) dnl
-
- gen_require(`
- type distccd_server_packet_t;
- ')
-
- allow $1 distccd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_distccd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send distccd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_distccd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_distccd_server_packets'($*)) dnl
-
- gen_require(`
- type distccd_server_packet_t;
- ')
-
- dontaudit $1 distccd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_distccd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive distccd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_distccd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_distccd_server_packets'($*)) dnl
-
- gen_require(`
- type distccd_server_packet_t;
- ')
-
- allow $1 distccd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_distccd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive distccd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_distccd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_distccd_server_packets'($*)) dnl
-
- gen_require(`
- type distccd_server_packet_t;
- ')
-
- dontaudit $1 distccd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_distccd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive distccd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_distccd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_distccd_server_packets'($*)) dnl
-
- corenet_send_distccd_server_packets($1)
- corenet_receive_distccd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_distccd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive distccd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_distccd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_distccd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_distccd_server_packets($1)
- corenet_dontaudit_receive_distccd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_distccd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to distccd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_distccd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_distccd_server_packets'($*)) dnl
-
- gen_require(`
- type distccd_server_packet_t;
- ')
-
- allow $1 distccd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_distccd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the dns port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_dns_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_dns_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_dns_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the dns port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_dns_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_dns_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_dns_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the dns port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_dns_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_dns_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_dns_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the dns port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_dns_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_dns_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_dns_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the dns port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_dns_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_dns_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_dns_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the dns port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_dns_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_dns_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_dns_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the dns port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_dns_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_dns_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_dns_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the dns port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_dns_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_dns_port'($*)) dnl
-
- gen_require(`
- type dns_port_t;
- ')
-
- allow $1 dns_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_dns_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the dns port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_dns_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_dns_port'($*)) dnl
-
- gen_require(`
- type dns_port_t;
- ')
-
- allow $1 dns_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_dns_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the dns port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_dns_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_dns_port'($*)) dnl
-
- gen_require(`
- type dns_port_t;
- ')
-
- allow $1 dns_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_dns_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send dns_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_dns_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_dns_client_packets'($*)) dnl
-
- gen_require(`
- type dns_client_packet_t;
- ')
-
- allow $1 dns_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_dns_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send dns_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_dns_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dns_client_packets'($*)) dnl
-
- gen_require(`
- type dns_client_packet_t;
- ')
-
- dontaudit $1 dns_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dns_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive dns_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_dns_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_dns_client_packets'($*)) dnl
-
- gen_require(`
- type dns_client_packet_t;
- ')
-
- allow $1 dns_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_dns_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive dns_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_dns_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dns_client_packets'($*)) dnl
-
- gen_require(`
- type dns_client_packet_t;
- ')
-
- dontaudit $1 dns_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dns_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive dns_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_dns_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dns_client_packets'($*)) dnl
-
- corenet_send_dns_client_packets($1)
- corenet_receive_dns_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dns_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive dns_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_dns_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dns_client_packets'($*)) dnl
-
- corenet_dontaudit_send_dns_client_packets($1)
- corenet_dontaudit_receive_dns_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dns_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to dns_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_dns_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dns_client_packets'($*)) dnl
-
- gen_require(`
- type dns_client_packet_t;
- ')
-
- allow $1 dns_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_dns_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send dns_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_dns_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_dns_server_packets'($*)) dnl
-
- gen_require(`
- type dns_server_packet_t;
- ')
-
- allow $1 dns_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_dns_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send dns_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_dns_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dns_server_packets'($*)) dnl
-
- gen_require(`
- type dns_server_packet_t;
- ')
-
- dontaudit $1 dns_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dns_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive dns_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_dns_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_dns_server_packets'($*)) dnl
-
- gen_require(`
- type dns_server_packet_t;
- ')
-
- allow $1 dns_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_dns_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive dns_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_dns_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dns_server_packets'($*)) dnl
-
- gen_require(`
- type dns_server_packet_t;
- ')
-
- dontaudit $1 dns_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dns_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive dns_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_dns_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dns_server_packets'($*)) dnl
-
- corenet_send_dns_server_packets($1)
- corenet_receive_dns_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dns_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive dns_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_dns_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dns_server_packets'($*)) dnl
-
- corenet_dontaudit_send_dns_server_packets($1)
- corenet_dontaudit_receive_dns_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dns_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to dns_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_dns_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dns_server_packets'($*)) dnl
-
- gen_require(`
- type dns_server_packet_t;
- ')
-
- allow $1 dns_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_dns_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the dropbox port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_dropbox_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_dropbox_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_dropbox_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the dropbox port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_dropbox_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_dropbox_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_dropbox_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the dropbox port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_dropbox_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_dropbox_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_dropbox_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the dropbox port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_dropbox_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_dropbox_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_dropbox_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the dropbox port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_dropbox_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_dropbox_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_dropbox_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the dropbox port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_dropbox_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_dropbox_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_dropbox_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the dropbox port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_dropbox_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_dropbox_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_dropbox_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the dropbox port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_dropbox_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_dropbox_port'($*)) dnl
-
- gen_require(`
- type dropbox_port_t;
- ')
-
- allow $1 dropbox_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_dropbox_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the dropbox port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_dropbox_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_dropbox_port'($*)) dnl
-
- gen_require(`
- type dropbox_port_t;
- ')
-
- allow $1 dropbox_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_dropbox_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the dropbox port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_dropbox_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_dropbox_port'($*)) dnl
-
- gen_require(`
- type dropbox_port_t;
- ')
-
- allow $1 dropbox_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_dropbox_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send dropbox_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_dropbox_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_dropbox_client_packets'($*)) dnl
-
- gen_require(`
- type dropbox_client_packet_t;
- ')
-
- allow $1 dropbox_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_dropbox_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send dropbox_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_dropbox_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dropbox_client_packets'($*)) dnl
-
- gen_require(`
- type dropbox_client_packet_t;
- ')
-
- dontaudit $1 dropbox_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dropbox_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive dropbox_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_dropbox_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_dropbox_client_packets'($*)) dnl
-
- gen_require(`
- type dropbox_client_packet_t;
- ')
-
- allow $1 dropbox_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_dropbox_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive dropbox_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_dropbox_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dropbox_client_packets'($*)) dnl
-
- gen_require(`
- type dropbox_client_packet_t;
- ')
-
- dontaudit $1 dropbox_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dropbox_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive dropbox_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_dropbox_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dropbox_client_packets'($*)) dnl
-
- corenet_send_dropbox_client_packets($1)
- corenet_receive_dropbox_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dropbox_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive dropbox_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_dropbox_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dropbox_client_packets'($*)) dnl
-
- corenet_dontaudit_send_dropbox_client_packets($1)
- corenet_dontaudit_receive_dropbox_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dropbox_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to dropbox_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_dropbox_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dropbox_client_packets'($*)) dnl
-
- gen_require(`
- type dropbox_client_packet_t;
- ')
-
- allow $1 dropbox_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_dropbox_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send dropbox_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_dropbox_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_dropbox_server_packets'($*)) dnl
-
- gen_require(`
- type dropbox_server_packet_t;
- ')
-
- allow $1 dropbox_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_dropbox_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send dropbox_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_dropbox_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dropbox_server_packets'($*)) dnl
-
- gen_require(`
- type dropbox_server_packet_t;
- ')
-
- dontaudit $1 dropbox_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dropbox_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive dropbox_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_dropbox_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_dropbox_server_packets'($*)) dnl
-
- gen_require(`
- type dropbox_server_packet_t;
- ')
-
- allow $1 dropbox_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_dropbox_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive dropbox_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_dropbox_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dropbox_server_packets'($*)) dnl
-
- gen_require(`
- type dropbox_server_packet_t;
- ')
-
- dontaudit $1 dropbox_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dropbox_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive dropbox_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_dropbox_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dropbox_server_packets'($*)) dnl
-
- corenet_send_dropbox_server_packets($1)
- corenet_receive_dropbox_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dropbox_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive dropbox_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_dropbox_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dropbox_server_packets'($*)) dnl
-
- corenet_dontaudit_send_dropbox_server_packets($1)
- corenet_dontaudit_receive_dropbox_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dropbox_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to dropbox_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_dropbox_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dropbox_server_packets'($*)) dnl
-
- gen_require(`
- type dropbox_server_packet_t;
- ')
-
- allow $1 dropbox_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_dropbox_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the efs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_efs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_efs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_efs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the efs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_efs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_efs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_efs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the efs port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_efs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_efs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_efs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the efs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_efs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_efs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_efs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the efs port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_efs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_efs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_efs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the efs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_efs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_efs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_efs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the efs port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_efs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_efs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_efs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the efs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_efs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_efs_port'($*)) dnl
-
- gen_require(`
- type efs_port_t;
- ')
-
- allow $1 efs_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_efs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the efs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_efs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_efs_port'($*)) dnl
-
- gen_require(`
- type efs_port_t;
- ')
-
- allow $1 efs_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_efs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the efs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_efs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_efs_port'($*)) dnl
-
- gen_require(`
- type efs_port_t;
- ')
-
- allow $1 efs_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_efs_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send efs_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_efs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_efs_client_packets'($*)) dnl
-
- gen_require(`
- type efs_client_packet_t;
- ')
-
- allow $1 efs_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_efs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send efs_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_efs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_efs_client_packets'($*)) dnl
-
- gen_require(`
- type efs_client_packet_t;
- ')
-
- dontaudit $1 efs_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_efs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive efs_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_efs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_efs_client_packets'($*)) dnl
-
- gen_require(`
- type efs_client_packet_t;
- ')
-
- allow $1 efs_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_efs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive efs_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_efs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_efs_client_packets'($*)) dnl
-
- gen_require(`
- type efs_client_packet_t;
- ')
-
- dontaudit $1 efs_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_efs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive efs_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_efs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_efs_client_packets'($*)) dnl
-
- corenet_send_efs_client_packets($1)
- corenet_receive_efs_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_efs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive efs_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_efs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_efs_client_packets'($*)) dnl
-
- corenet_dontaudit_send_efs_client_packets($1)
- corenet_dontaudit_receive_efs_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_efs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to efs_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_efs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_efs_client_packets'($*)) dnl
-
- gen_require(`
- type efs_client_packet_t;
- ')
-
- allow $1 efs_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_efs_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send efs_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_efs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_efs_server_packets'($*)) dnl
-
- gen_require(`
- type efs_server_packet_t;
- ')
-
- allow $1 efs_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_efs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send efs_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_efs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_efs_server_packets'($*)) dnl
-
- gen_require(`
- type efs_server_packet_t;
- ')
-
- dontaudit $1 efs_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_efs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive efs_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_efs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_efs_server_packets'($*)) dnl
-
- gen_require(`
- type efs_server_packet_t;
- ')
-
- allow $1 efs_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_efs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive efs_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_efs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_efs_server_packets'($*)) dnl
-
- gen_require(`
- type efs_server_packet_t;
- ')
-
- dontaudit $1 efs_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_efs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive efs_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_efs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_efs_server_packets'($*)) dnl
-
- corenet_send_efs_server_packets($1)
- corenet_receive_efs_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_efs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive efs_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_efs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_efs_server_packets'($*)) dnl
-
- corenet_dontaudit_send_efs_server_packets($1)
- corenet_dontaudit_receive_efs_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_efs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to efs_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_efs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_efs_server_packets'($*)) dnl
-
- gen_require(`
- type efs_server_packet_t;
- ')
-
- allow $1 efs_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_efs_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the embrace_dp_c port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_embrace_dp_c_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_embrace_dp_c_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_embrace_dp_c_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the embrace_dp_c port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_embrace_dp_c_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_embrace_dp_c_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_embrace_dp_c_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the embrace_dp_c port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_embrace_dp_c_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_embrace_dp_c_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_embrace_dp_c_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the embrace_dp_c port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_embrace_dp_c_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_embrace_dp_c_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_embrace_dp_c_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the embrace_dp_c port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_embrace_dp_c_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_embrace_dp_c_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_embrace_dp_c_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the embrace_dp_c port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_embrace_dp_c_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_embrace_dp_c_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_embrace_dp_c_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the embrace_dp_c port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_embrace_dp_c_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_embrace_dp_c_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_embrace_dp_c_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the embrace_dp_c port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_embrace_dp_c_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_embrace_dp_c_port'($*)) dnl
-
- gen_require(`
- type embrace_dp_c_port_t;
- ')
-
- allow $1 embrace_dp_c_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_embrace_dp_c_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the embrace_dp_c port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_embrace_dp_c_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_embrace_dp_c_port'($*)) dnl
-
- gen_require(`
- type embrace_dp_c_port_t;
- ')
-
- allow $1 embrace_dp_c_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_embrace_dp_c_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the embrace_dp_c port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_embrace_dp_c_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_embrace_dp_c_port'($*)) dnl
-
- gen_require(`
- type embrace_dp_c_port_t;
- ')
-
- allow $1 embrace_dp_c_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_embrace_dp_c_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send embrace_dp_c_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_embrace_dp_c_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_embrace_dp_c_client_packets'($*)) dnl
-
- gen_require(`
- type embrace_dp_c_client_packet_t;
- ')
-
- allow $1 embrace_dp_c_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_embrace_dp_c_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send embrace_dp_c_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_embrace_dp_c_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_embrace_dp_c_client_packets'($*)) dnl
-
- gen_require(`
- type embrace_dp_c_client_packet_t;
- ')
-
- dontaudit $1 embrace_dp_c_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_embrace_dp_c_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive embrace_dp_c_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_embrace_dp_c_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_embrace_dp_c_client_packets'($*)) dnl
-
- gen_require(`
- type embrace_dp_c_client_packet_t;
- ')
-
- allow $1 embrace_dp_c_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_embrace_dp_c_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive embrace_dp_c_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_embrace_dp_c_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_embrace_dp_c_client_packets'($*)) dnl
-
- gen_require(`
- type embrace_dp_c_client_packet_t;
- ')
-
- dontaudit $1 embrace_dp_c_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_embrace_dp_c_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive embrace_dp_c_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_embrace_dp_c_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_embrace_dp_c_client_packets'($*)) dnl
-
- corenet_send_embrace_dp_c_client_packets($1)
- corenet_receive_embrace_dp_c_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_embrace_dp_c_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive embrace_dp_c_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_embrace_dp_c_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_embrace_dp_c_client_packets'($*)) dnl
-
- corenet_dontaudit_send_embrace_dp_c_client_packets($1)
- corenet_dontaudit_receive_embrace_dp_c_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_embrace_dp_c_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to embrace_dp_c_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_embrace_dp_c_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_embrace_dp_c_client_packets'($*)) dnl
-
- gen_require(`
- type embrace_dp_c_client_packet_t;
- ')
-
- allow $1 embrace_dp_c_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_embrace_dp_c_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send embrace_dp_c_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_embrace_dp_c_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_embrace_dp_c_server_packets'($*)) dnl
-
- gen_require(`
- type embrace_dp_c_server_packet_t;
- ')
-
- allow $1 embrace_dp_c_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_embrace_dp_c_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send embrace_dp_c_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_embrace_dp_c_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_embrace_dp_c_server_packets'($*)) dnl
-
- gen_require(`
- type embrace_dp_c_server_packet_t;
- ')
-
- dontaudit $1 embrace_dp_c_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_embrace_dp_c_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive embrace_dp_c_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_embrace_dp_c_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_embrace_dp_c_server_packets'($*)) dnl
-
- gen_require(`
- type embrace_dp_c_server_packet_t;
- ')
-
- allow $1 embrace_dp_c_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_embrace_dp_c_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive embrace_dp_c_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_embrace_dp_c_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_embrace_dp_c_server_packets'($*)) dnl
-
- gen_require(`
- type embrace_dp_c_server_packet_t;
- ')
-
- dontaudit $1 embrace_dp_c_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_embrace_dp_c_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive embrace_dp_c_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_embrace_dp_c_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_embrace_dp_c_server_packets'($*)) dnl
-
- corenet_send_embrace_dp_c_server_packets($1)
- corenet_receive_embrace_dp_c_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_embrace_dp_c_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive embrace_dp_c_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_embrace_dp_c_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_embrace_dp_c_server_packets'($*)) dnl
-
- corenet_dontaudit_send_embrace_dp_c_server_packets($1)
- corenet_dontaudit_receive_embrace_dp_c_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_embrace_dp_c_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to embrace_dp_c_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_embrace_dp_c_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_embrace_dp_c_server_packets'($*)) dnl
-
- gen_require(`
- type embrace_dp_c_server_packet_t;
- ')
-
- allow $1 embrace_dp_c_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_embrace_dp_c_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the epmap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_epmap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_epmap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_epmap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the epmap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_epmap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_epmap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_epmap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the epmap port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_epmap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_epmap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_epmap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the epmap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_epmap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_epmap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_epmap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the epmap port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_epmap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_epmap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_epmap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the epmap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_epmap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_epmap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_epmap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the epmap port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_epmap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_epmap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_epmap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the epmap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_epmap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_epmap_port'($*)) dnl
-
- gen_require(`
- type epmap_port_t;
- ')
-
- allow $1 epmap_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_epmap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the epmap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_epmap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_epmap_port'($*)) dnl
-
- gen_require(`
- type epmap_port_t;
- ')
-
- allow $1 epmap_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_epmap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the epmap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_epmap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_epmap_port'($*)) dnl
-
- gen_require(`
- type epmap_port_t;
- ')
-
- allow $1 epmap_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_epmap_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send epmap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_epmap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_epmap_client_packets'($*)) dnl
-
- gen_require(`
- type epmap_client_packet_t;
- ')
-
- allow $1 epmap_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_epmap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send epmap_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_epmap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_epmap_client_packets'($*)) dnl
-
- gen_require(`
- type epmap_client_packet_t;
- ')
-
- dontaudit $1 epmap_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_epmap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive epmap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_epmap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_epmap_client_packets'($*)) dnl
-
- gen_require(`
- type epmap_client_packet_t;
- ')
-
- allow $1 epmap_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_epmap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive epmap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_epmap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_epmap_client_packets'($*)) dnl
-
- gen_require(`
- type epmap_client_packet_t;
- ')
-
- dontaudit $1 epmap_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_epmap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive epmap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_epmap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_epmap_client_packets'($*)) dnl
-
- corenet_send_epmap_client_packets($1)
- corenet_receive_epmap_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_epmap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive epmap_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_epmap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_epmap_client_packets'($*)) dnl
-
- corenet_dontaudit_send_epmap_client_packets($1)
- corenet_dontaudit_receive_epmap_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_epmap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to epmap_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_epmap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_epmap_client_packets'($*)) dnl
-
- gen_require(`
- type epmap_client_packet_t;
- ')
-
- allow $1 epmap_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_epmap_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send epmap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_epmap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_epmap_server_packets'($*)) dnl
-
- gen_require(`
- type epmap_server_packet_t;
- ')
-
- allow $1 epmap_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_epmap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send epmap_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_epmap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_epmap_server_packets'($*)) dnl
-
- gen_require(`
- type epmap_server_packet_t;
- ')
-
- dontaudit $1 epmap_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_epmap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive epmap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_epmap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_epmap_server_packets'($*)) dnl
-
- gen_require(`
- type epmap_server_packet_t;
- ')
-
- allow $1 epmap_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_epmap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive epmap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_epmap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_epmap_server_packets'($*)) dnl
-
- gen_require(`
- type epmap_server_packet_t;
- ')
-
- dontaudit $1 epmap_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_epmap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive epmap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_epmap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_epmap_server_packets'($*)) dnl
-
- corenet_send_epmap_server_packets($1)
- corenet_receive_epmap_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_epmap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive epmap_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_epmap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_epmap_server_packets'($*)) dnl
-
- corenet_dontaudit_send_epmap_server_packets($1)
- corenet_dontaudit_receive_epmap_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_epmap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to epmap_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_epmap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_epmap_server_packets'($*)) dnl
-
- gen_require(`
- type epmap_server_packet_t;
- ')
-
- allow $1 epmap_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_epmap_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the epmd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_epmd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_epmd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_epmd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the epmd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_epmd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_epmd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_epmd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the epmd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_epmd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_epmd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_epmd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the epmd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_epmd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_epmd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_epmd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the epmd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_epmd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_epmd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_epmd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the epmd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_epmd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_epmd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_epmd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the epmd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_epmd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_epmd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_epmd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the epmd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_epmd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_epmd_port'($*)) dnl
-
- gen_require(`
- type epmd_port_t;
- ')
-
- allow $1 epmd_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_epmd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the epmd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_epmd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_epmd_port'($*)) dnl
-
- gen_require(`
- type epmd_port_t;
- ')
-
- allow $1 epmd_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_epmd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the epmd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_epmd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_epmd_port'($*)) dnl
-
- gen_require(`
- type epmd_port_t;
- ')
-
- allow $1 epmd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_epmd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send epmd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_epmd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_epmd_client_packets'($*)) dnl
-
- gen_require(`
- type epmd_client_packet_t;
- ')
-
- allow $1 epmd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_epmd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send epmd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_epmd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_epmd_client_packets'($*)) dnl
-
- gen_require(`
- type epmd_client_packet_t;
- ')
-
- dontaudit $1 epmd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_epmd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive epmd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_epmd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_epmd_client_packets'($*)) dnl
-
- gen_require(`
- type epmd_client_packet_t;
- ')
-
- allow $1 epmd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_epmd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive epmd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_epmd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_epmd_client_packets'($*)) dnl
-
- gen_require(`
- type epmd_client_packet_t;
- ')
-
- dontaudit $1 epmd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_epmd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive epmd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_epmd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_epmd_client_packets'($*)) dnl
-
- corenet_send_epmd_client_packets($1)
- corenet_receive_epmd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_epmd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive epmd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_epmd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_epmd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_epmd_client_packets($1)
- corenet_dontaudit_receive_epmd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_epmd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to epmd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_epmd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_epmd_client_packets'($*)) dnl
-
- gen_require(`
- type epmd_client_packet_t;
- ')
-
- allow $1 epmd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_epmd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send epmd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_epmd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_epmd_server_packets'($*)) dnl
-
- gen_require(`
- type epmd_server_packet_t;
- ')
-
- allow $1 epmd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_epmd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send epmd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_epmd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_epmd_server_packets'($*)) dnl
-
- gen_require(`
- type epmd_server_packet_t;
- ')
-
- dontaudit $1 epmd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_epmd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive epmd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_epmd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_epmd_server_packets'($*)) dnl
-
- gen_require(`
- type epmd_server_packet_t;
- ')
-
- allow $1 epmd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_epmd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive epmd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_epmd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_epmd_server_packets'($*)) dnl
-
- gen_require(`
- type epmd_server_packet_t;
- ')
-
- dontaudit $1 epmd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_epmd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive epmd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_epmd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_epmd_server_packets'($*)) dnl
-
- corenet_send_epmd_server_packets($1)
- corenet_receive_epmd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_epmd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive epmd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_epmd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_epmd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_epmd_server_packets($1)
- corenet_dontaudit_receive_epmd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_epmd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to epmd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_epmd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_epmd_server_packets'($*)) dnl
-
- gen_require(`
- type epmd_server_packet_t;
- ')
-
- allow $1 epmd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_epmd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the fingerd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_fingerd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_fingerd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_fingerd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the fingerd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_fingerd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_fingerd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_fingerd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the fingerd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_fingerd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_fingerd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_fingerd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the fingerd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_fingerd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_fingerd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_fingerd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the fingerd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_fingerd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_fingerd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_fingerd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the fingerd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_fingerd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_fingerd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_fingerd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the fingerd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_fingerd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_fingerd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_fingerd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the fingerd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_fingerd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_fingerd_port'($*)) dnl
-
- gen_require(`
- type fingerd_port_t;
- ')
-
- allow $1 fingerd_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_fingerd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the fingerd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_fingerd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_fingerd_port'($*)) dnl
-
- gen_require(`
- type fingerd_port_t;
- ')
-
- allow $1 fingerd_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_fingerd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the fingerd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_fingerd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_fingerd_port'($*)) dnl
-
- gen_require(`
- type fingerd_port_t;
- ')
-
- allow $1 fingerd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_fingerd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send fingerd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_fingerd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_fingerd_client_packets'($*)) dnl
-
- gen_require(`
- type fingerd_client_packet_t;
- ')
-
- allow $1 fingerd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_fingerd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send fingerd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_fingerd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_fingerd_client_packets'($*)) dnl
-
- gen_require(`
- type fingerd_client_packet_t;
- ')
-
- dontaudit $1 fingerd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_fingerd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive fingerd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_fingerd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_fingerd_client_packets'($*)) dnl
-
- gen_require(`
- type fingerd_client_packet_t;
- ')
-
- allow $1 fingerd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_fingerd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive fingerd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_fingerd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_fingerd_client_packets'($*)) dnl
-
- gen_require(`
- type fingerd_client_packet_t;
- ')
-
- dontaudit $1 fingerd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_fingerd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive fingerd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_fingerd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_fingerd_client_packets'($*)) dnl
-
- corenet_send_fingerd_client_packets($1)
- corenet_receive_fingerd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_fingerd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive fingerd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_fingerd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_fingerd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_fingerd_client_packets($1)
- corenet_dontaudit_receive_fingerd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_fingerd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to fingerd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_fingerd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_fingerd_client_packets'($*)) dnl
-
- gen_require(`
- type fingerd_client_packet_t;
- ')
-
- allow $1 fingerd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_fingerd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send fingerd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_fingerd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_fingerd_server_packets'($*)) dnl
-
- gen_require(`
- type fingerd_server_packet_t;
- ')
-
- allow $1 fingerd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_fingerd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send fingerd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_fingerd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_fingerd_server_packets'($*)) dnl
-
- gen_require(`
- type fingerd_server_packet_t;
- ')
-
- dontaudit $1 fingerd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_fingerd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive fingerd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_fingerd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_fingerd_server_packets'($*)) dnl
-
- gen_require(`
- type fingerd_server_packet_t;
- ')
-
- allow $1 fingerd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_fingerd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive fingerd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_fingerd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_fingerd_server_packets'($*)) dnl
-
- gen_require(`
- type fingerd_server_packet_t;
- ')
-
- dontaudit $1 fingerd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_fingerd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive fingerd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_fingerd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_fingerd_server_packets'($*)) dnl
-
- corenet_send_fingerd_server_packets($1)
- corenet_receive_fingerd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_fingerd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive fingerd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_fingerd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_fingerd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_fingerd_server_packets($1)
- corenet_dontaudit_receive_fingerd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_fingerd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to fingerd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_fingerd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_fingerd_server_packets'($*)) dnl
-
- gen_require(`
- type fingerd_server_packet_t;
- ')
-
- allow $1 fingerd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_fingerd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the ftp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_ftp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ftp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ftp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the ftp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_ftp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ftp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_ftp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the ftp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_ftp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ftp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ftp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the ftp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_ftp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ftp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ftp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the ftp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_ftp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ftp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ftp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the ftp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_ftp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ftp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ftp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the ftp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_ftp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ftp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ftp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the ftp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_ftp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ftp_port'($*)) dnl
-
- gen_require(`
- type ftp_port_t;
- ')
-
- allow $1 ftp_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ftp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the ftp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_ftp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ftp_port'($*)) dnl
-
- gen_require(`
- type ftp_port_t;
- ')
-
- allow $1 ftp_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ftp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the ftp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_ftp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ftp_port'($*)) dnl
-
- gen_require(`
- type ftp_port_t;
- ')
-
- allow $1 ftp_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ftp_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ftp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ftp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ftp_client_packets'($*)) dnl
-
- gen_require(`
- type ftp_client_packet_t;
- ')
-
- allow $1 ftp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ftp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ftp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ftp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ftp_client_packets'($*)) dnl
-
- gen_require(`
- type ftp_client_packet_t;
- ')
-
- dontaudit $1 ftp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ftp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ftp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ftp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ftp_client_packets'($*)) dnl
-
- gen_require(`
- type ftp_client_packet_t;
- ')
-
- allow $1 ftp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ftp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ftp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ftp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ftp_client_packets'($*)) dnl
-
- gen_require(`
- type ftp_client_packet_t;
- ')
-
- dontaudit $1 ftp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ftp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ftp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ftp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ftp_client_packets'($*)) dnl
-
- corenet_send_ftp_client_packets($1)
- corenet_receive_ftp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ftp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ftp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ftp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ftp_client_packets'($*)) dnl
-
- corenet_dontaudit_send_ftp_client_packets($1)
- corenet_dontaudit_receive_ftp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ftp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ftp_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ftp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ftp_client_packets'($*)) dnl
-
- gen_require(`
- type ftp_client_packet_t;
- ')
-
- allow $1 ftp_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ftp_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ftp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ftp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ftp_server_packets'($*)) dnl
-
- gen_require(`
- type ftp_server_packet_t;
- ')
-
- allow $1 ftp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ftp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ftp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ftp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ftp_server_packets'($*)) dnl
-
- gen_require(`
- type ftp_server_packet_t;
- ')
-
- dontaudit $1 ftp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ftp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ftp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ftp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ftp_server_packets'($*)) dnl
-
- gen_require(`
- type ftp_server_packet_t;
- ')
-
- allow $1 ftp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ftp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ftp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ftp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ftp_server_packets'($*)) dnl
-
- gen_require(`
- type ftp_server_packet_t;
- ')
-
- dontaudit $1 ftp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ftp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ftp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ftp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ftp_server_packets'($*)) dnl
-
- corenet_send_ftp_server_packets($1)
- corenet_receive_ftp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ftp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ftp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ftp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ftp_server_packets'($*)) dnl
-
- corenet_dontaudit_send_ftp_server_packets($1)
- corenet_dontaudit_receive_ftp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ftp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ftp_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ftp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ftp_server_packets'($*)) dnl
-
- gen_require(`
- type ftp_server_packet_t;
- ')
-
- allow $1 ftp_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ftp_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the ftp_data port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_ftp_data_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ftp_data_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ftp_data_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the ftp_data port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_ftp_data_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ftp_data_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_ftp_data_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the ftp_data port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_ftp_data_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ftp_data_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ftp_data_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the ftp_data port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_ftp_data_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ftp_data_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ftp_data_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the ftp_data port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_ftp_data_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ftp_data_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ftp_data_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the ftp_data port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_ftp_data_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ftp_data_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ftp_data_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the ftp_data port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_ftp_data_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ftp_data_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ftp_data_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the ftp_data port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_ftp_data_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ftp_data_port'($*)) dnl
-
- gen_require(`
- type ftp_data_port_t;
- ')
-
- allow $1 ftp_data_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ftp_data_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the ftp_data port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_ftp_data_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ftp_data_port'($*)) dnl
-
- gen_require(`
- type ftp_data_port_t;
- ')
-
- allow $1 ftp_data_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ftp_data_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the ftp_data port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_ftp_data_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ftp_data_port'($*)) dnl
-
- gen_require(`
- type ftp_data_port_t;
- ')
-
- allow $1 ftp_data_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ftp_data_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ftp_data_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ftp_data_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ftp_data_client_packets'($*)) dnl
-
- gen_require(`
- type ftp_data_client_packet_t;
- ')
-
- allow $1 ftp_data_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ftp_data_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ftp_data_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ftp_data_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ftp_data_client_packets'($*)) dnl
-
- gen_require(`
- type ftp_data_client_packet_t;
- ')
-
- dontaudit $1 ftp_data_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ftp_data_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ftp_data_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ftp_data_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ftp_data_client_packets'($*)) dnl
-
- gen_require(`
- type ftp_data_client_packet_t;
- ')
-
- allow $1 ftp_data_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ftp_data_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ftp_data_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ftp_data_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ftp_data_client_packets'($*)) dnl
-
- gen_require(`
- type ftp_data_client_packet_t;
- ')
-
- dontaudit $1 ftp_data_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ftp_data_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ftp_data_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ftp_data_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ftp_data_client_packets'($*)) dnl
-
- corenet_send_ftp_data_client_packets($1)
- corenet_receive_ftp_data_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ftp_data_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ftp_data_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ftp_data_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ftp_data_client_packets'($*)) dnl
-
- corenet_dontaudit_send_ftp_data_client_packets($1)
- corenet_dontaudit_receive_ftp_data_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ftp_data_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ftp_data_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ftp_data_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ftp_data_client_packets'($*)) dnl
-
- gen_require(`
- type ftp_data_client_packet_t;
- ')
-
- allow $1 ftp_data_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ftp_data_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ftp_data_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ftp_data_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ftp_data_server_packets'($*)) dnl
-
- gen_require(`
- type ftp_data_server_packet_t;
- ')
-
- allow $1 ftp_data_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ftp_data_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ftp_data_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ftp_data_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ftp_data_server_packets'($*)) dnl
-
- gen_require(`
- type ftp_data_server_packet_t;
- ')
-
- dontaudit $1 ftp_data_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ftp_data_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ftp_data_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ftp_data_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ftp_data_server_packets'($*)) dnl
-
- gen_require(`
- type ftp_data_server_packet_t;
- ')
-
- allow $1 ftp_data_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ftp_data_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ftp_data_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ftp_data_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ftp_data_server_packets'($*)) dnl
-
- gen_require(`
- type ftp_data_server_packet_t;
- ')
-
- dontaudit $1 ftp_data_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ftp_data_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ftp_data_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ftp_data_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ftp_data_server_packets'($*)) dnl
-
- corenet_send_ftp_data_server_packets($1)
- corenet_receive_ftp_data_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ftp_data_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ftp_data_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ftp_data_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ftp_data_server_packets'($*)) dnl
-
- corenet_dontaudit_send_ftp_data_server_packets($1)
- corenet_dontaudit_receive_ftp_data_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ftp_data_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ftp_data_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ftp_data_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ftp_data_server_packets'($*)) dnl
-
- gen_require(`
- type ftp_data_server_packet_t;
- ')
-
- allow $1 ftp_data_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ftp_data_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the gatekeeper port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_gatekeeper_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_gatekeeper_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_gatekeeper_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the gatekeeper port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_gatekeeper_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_gatekeeper_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_gatekeeper_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the gatekeeper port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_gatekeeper_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_gatekeeper_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_gatekeeper_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the gatekeeper port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_gatekeeper_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_gatekeeper_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_gatekeeper_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the gatekeeper port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_gatekeeper_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_gatekeeper_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_gatekeeper_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the gatekeeper port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_gatekeeper_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_gatekeeper_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_gatekeeper_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the gatekeeper port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_gatekeeper_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_gatekeeper_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_gatekeeper_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the gatekeeper port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_gatekeeper_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_gatekeeper_port'($*)) dnl
-
- gen_require(`
- type gatekeeper_port_t;
- ')
-
- allow $1 gatekeeper_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_gatekeeper_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the gatekeeper port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_gatekeeper_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_gatekeeper_port'($*)) dnl
-
- gen_require(`
- type gatekeeper_port_t;
- ')
-
- allow $1 gatekeeper_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_gatekeeper_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the gatekeeper port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_gatekeeper_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_gatekeeper_port'($*)) dnl
-
- gen_require(`
- type gatekeeper_port_t;
- ')
-
- allow $1 gatekeeper_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_gatekeeper_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send gatekeeper_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_gatekeeper_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_gatekeeper_client_packets'($*)) dnl
-
- gen_require(`
- type gatekeeper_client_packet_t;
- ')
-
- allow $1 gatekeeper_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_gatekeeper_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send gatekeeper_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_gatekeeper_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_gatekeeper_client_packets'($*)) dnl
-
- gen_require(`
- type gatekeeper_client_packet_t;
- ')
-
- dontaudit $1 gatekeeper_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_gatekeeper_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive gatekeeper_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_gatekeeper_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_gatekeeper_client_packets'($*)) dnl
-
- gen_require(`
- type gatekeeper_client_packet_t;
- ')
-
- allow $1 gatekeeper_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_gatekeeper_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive gatekeeper_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_gatekeeper_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_gatekeeper_client_packets'($*)) dnl
-
- gen_require(`
- type gatekeeper_client_packet_t;
- ')
-
- dontaudit $1 gatekeeper_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_gatekeeper_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive gatekeeper_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_gatekeeper_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_gatekeeper_client_packets'($*)) dnl
-
- corenet_send_gatekeeper_client_packets($1)
- corenet_receive_gatekeeper_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_gatekeeper_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive gatekeeper_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_gatekeeper_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_gatekeeper_client_packets'($*)) dnl
-
- corenet_dontaudit_send_gatekeeper_client_packets($1)
- corenet_dontaudit_receive_gatekeeper_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_gatekeeper_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to gatekeeper_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_gatekeeper_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_gatekeeper_client_packets'($*)) dnl
-
- gen_require(`
- type gatekeeper_client_packet_t;
- ')
-
- allow $1 gatekeeper_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_gatekeeper_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send gatekeeper_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_gatekeeper_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_gatekeeper_server_packets'($*)) dnl
-
- gen_require(`
- type gatekeeper_server_packet_t;
- ')
-
- allow $1 gatekeeper_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_gatekeeper_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send gatekeeper_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_gatekeeper_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_gatekeeper_server_packets'($*)) dnl
-
- gen_require(`
- type gatekeeper_server_packet_t;
- ')
-
- dontaudit $1 gatekeeper_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_gatekeeper_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive gatekeeper_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_gatekeeper_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_gatekeeper_server_packets'($*)) dnl
-
- gen_require(`
- type gatekeeper_server_packet_t;
- ')
-
- allow $1 gatekeeper_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_gatekeeper_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive gatekeeper_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_gatekeeper_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_gatekeeper_server_packets'($*)) dnl
-
- gen_require(`
- type gatekeeper_server_packet_t;
- ')
-
- dontaudit $1 gatekeeper_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_gatekeeper_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive gatekeeper_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_gatekeeper_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_gatekeeper_server_packets'($*)) dnl
-
- corenet_send_gatekeeper_server_packets($1)
- corenet_receive_gatekeeper_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_gatekeeper_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive gatekeeper_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_gatekeeper_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_gatekeeper_server_packets'($*)) dnl
-
- corenet_dontaudit_send_gatekeeper_server_packets($1)
- corenet_dontaudit_receive_gatekeeper_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_gatekeeper_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to gatekeeper_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_gatekeeper_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_gatekeeper_server_packets'($*)) dnl
-
- gen_require(`
- type gatekeeper_server_packet_t;
- ')
-
- allow $1 gatekeeper_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_gatekeeper_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the gdomap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_gdomap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_gdomap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_gdomap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the gdomap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_gdomap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_gdomap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_gdomap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the gdomap port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_gdomap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_gdomap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_gdomap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the gdomap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_gdomap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_gdomap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_gdomap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the gdomap port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_gdomap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_gdomap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_gdomap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the gdomap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_gdomap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_gdomap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_gdomap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the gdomap port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_gdomap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_gdomap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_gdomap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the gdomap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_gdomap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_gdomap_port'($*)) dnl
-
- gen_require(`
- type gdomap_port_t;
- ')
-
- allow $1 gdomap_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_gdomap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the gdomap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_gdomap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_gdomap_port'($*)) dnl
-
- gen_require(`
- type gdomap_port_t;
- ')
-
- allow $1 gdomap_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_gdomap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the gdomap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_gdomap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_gdomap_port'($*)) dnl
-
- gen_require(`
- type gdomap_port_t;
- ')
-
- allow $1 gdomap_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_gdomap_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send gdomap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_gdomap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_gdomap_client_packets'($*)) dnl
-
- gen_require(`
- type gdomap_client_packet_t;
- ')
-
- allow $1 gdomap_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_gdomap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send gdomap_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_gdomap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_gdomap_client_packets'($*)) dnl
-
- gen_require(`
- type gdomap_client_packet_t;
- ')
-
- dontaudit $1 gdomap_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_gdomap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive gdomap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_gdomap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_gdomap_client_packets'($*)) dnl
-
- gen_require(`
- type gdomap_client_packet_t;
- ')
-
- allow $1 gdomap_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_gdomap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive gdomap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_gdomap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_gdomap_client_packets'($*)) dnl
-
- gen_require(`
- type gdomap_client_packet_t;
- ')
-
- dontaudit $1 gdomap_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_gdomap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive gdomap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_gdomap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_gdomap_client_packets'($*)) dnl
-
- corenet_send_gdomap_client_packets($1)
- corenet_receive_gdomap_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_gdomap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive gdomap_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_gdomap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_gdomap_client_packets'($*)) dnl
-
- corenet_dontaudit_send_gdomap_client_packets($1)
- corenet_dontaudit_receive_gdomap_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_gdomap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to gdomap_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_gdomap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_gdomap_client_packets'($*)) dnl
-
- gen_require(`
- type gdomap_client_packet_t;
- ')
-
- allow $1 gdomap_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_gdomap_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send gdomap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_gdomap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_gdomap_server_packets'($*)) dnl
-
- gen_require(`
- type gdomap_server_packet_t;
- ')
-
- allow $1 gdomap_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_gdomap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send gdomap_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_gdomap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_gdomap_server_packets'($*)) dnl
-
- gen_require(`
- type gdomap_server_packet_t;
- ')
-
- dontaudit $1 gdomap_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_gdomap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive gdomap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_gdomap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_gdomap_server_packets'($*)) dnl
-
- gen_require(`
- type gdomap_server_packet_t;
- ')
-
- allow $1 gdomap_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_gdomap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive gdomap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_gdomap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_gdomap_server_packets'($*)) dnl
-
- gen_require(`
- type gdomap_server_packet_t;
- ')
-
- dontaudit $1 gdomap_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_gdomap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive gdomap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_gdomap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_gdomap_server_packets'($*)) dnl
-
- corenet_send_gdomap_server_packets($1)
- corenet_receive_gdomap_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_gdomap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive gdomap_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_gdomap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_gdomap_server_packets'($*)) dnl
-
- corenet_dontaudit_send_gdomap_server_packets($1)
- corenet_dontaudit_receive_gdomap_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_gdomap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to gdomap_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_gdomap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_gdomap_server_packets'($*)) dnl
-
- gen_require(`
- type gdomap_server_packet_t;
- ')
-
- allow $1 gdomap_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_gdomap_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the gds_db port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_gds_db_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_gds_db_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_gds_db_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the gds_db port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_gds_db_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_gds_db_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_gds_db_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the gds_db port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_gds_db_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_gds_db_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_gds_db_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the gds_db port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_gds_db_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_gds_db_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_gds_db_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the gds_db port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_gds_db_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_gds_db_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_gds_db_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the gds_db port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_gds_db_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_gds_db_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_gds_db_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the gds_db port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_gds_db_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_gds_db_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_gds_db_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the gds_db port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_gds_db_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_gds_db_port'($*)) dnl
-
- gen_require(`
- type gds_db_port_t;
- ')
-
- allow $1 gds_db_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_gds_db_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the gds_db port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_gds_db_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_gds_db_port'($*)) dnl
-
- gen_require(`
- type gds_db_port_t;
- ')
-
- allow $1 gds_db_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_gds_db_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the gds_db port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_gds_db_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_gds_db_port'($*)) dnl
-
- gen_require(`
- type gds_db_port_t;
- ')
-
- allow $1 gds_db_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_gds_db_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send gds_db_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_gds_db_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_gds_db_client_packets'($*)) dnl
-
- gen_require(`
- type gds_db_client_packet_t;
- ')
-
- allow $1 gds_db_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_gds_db_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send gds_db_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_gds_db_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_gds_db_client_packets'($*)) dnl
-
- gen_require(`
- type gds_db_client_packet_t;
- ')
-
- dontaudit $1 gds_db_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_gds_db_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive gds_db_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_gds_db_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_gds_db_client_packets'($*)) dnl
-
- gen_require(`
- type gds_db_client_packet_t;
- ')
-
- allow $1 gds_db_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_gds_db_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive gds_db_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_gds_db_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_gds_db_client_packets'($*)) dnl
-
- gen_require(`
- type gds_db_client_packet_t;
- ')
-
- dontaudit $1 gds_db_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_gds_db_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive gds_db_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_gds_db_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_gds_db_client_packets'($*)) dnl
-
- corenet_send_gds_db_client_packets($1)
- corenet_receive_gds_db_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_gds_db_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive gds_db_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_gds_db_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_gds_db_client_packets'($*)) dnl
-
- corenet_dontaudit_send_gds_db_client_packets($1)
- corenet_dontaudit_receive_gds_db_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_gds_db_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to gds_db_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_gds_db_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_gds_db_client_packets'($*)) dnl
-
- gen_require(`
- type gds_db_client_packet_t;
- ')
-
- allow $1 gds_db_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_gds_db_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send gds_db_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_gds_db_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_gds_db_server_packets'($*)) dnl
-
- gen_require(`
- type gds_db_server_packet_t;
- ')
-
- allow $1 gds_db_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_gds_db_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send gds_db_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_gds_db_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_gds_db_server_packets'($*)) dnl
-
- gen_require(`
- type gds_db_server_packet_t;
- ')
-
- dontaudit $1 gds_db_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_gds_db_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive gds_db_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_gds_db_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_gds_db_server_packets'($*)) dnl
-
- gen_require(`
- type gds_db_server_packet_t;
- ')
-
- allow $1 gds_db_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_gds_db_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive gds_db_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_gds_db_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_gds_db_server_packets'($*)) dnl
-
- gen_require(`
- type gds_db_server_packet_t;
- ')
-
- dontaudit $1 gds_db_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_gds_db_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive gds_db_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_gds_db_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_gds_db_server_packets'($*)) dnl
-
- corenet_send_gds_db_server_packets($1)
- corenet_receive_gds_db_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_gds_db_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive gds_db_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_gds_db_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_gds_db_server_packets'($*)) dnl
-
- corenet_dontaudit_send_gds_db_server_packets($1)
- corenet_dontaudit_receive_gds_db_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_gds_db_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to gds_db_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_gds_db_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_gds_db_server_packets'($*)) dnl
-
- gen_require(`
- type gds_db_server_packet_t;
- ')
-
- allow $1 gds_db_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_gds_db_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the giftd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_giftd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_giftd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_giftd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the giftd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_giftd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_giftd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_giftd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the giftd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_giftd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_giftd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_giftd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the giftd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_giftd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_giftd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_giftd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the giftd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_giftd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_giftd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_giftd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the giftd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_giftd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_giftd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_giftd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the giftd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_giftd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_giftd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_giftd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the giftd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_giftd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_giftd_port'($*)) dnl
-
- gen_require(`
- type giftd_port_t;
- ')
-
- allow $1 giftd_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_giftd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the giftd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_giftd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_giftd_port'($*)) dnl
-
- gen_require(`
- type giftd_port_t;
- ')
-
- allow $1 giftd_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_giftd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the giftd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_giftd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_giftd_port'($*)) dnl
-
- gen_require(`
- type giftd_port_t;
- ')
-
- allow $1 giftd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_giftd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send giftd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_giftd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_giftd_client_packets'($*)) dnl
-
- gen_require(`
- type giftd_client_packet_t;
- ')
-
- allow $1 giftd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_giftd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send giftd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_giftd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_giftd_client_packets'($*)) dnl
-
- gen_require(`
- type giftd_client_packet_t;
- ')
-
- dontaudit $1 giftd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_giftd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive giftd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_giftd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_giftd_client_packets'($*)) dnl
-
- gen_require(`
- type giftd_client_packet_t;
- ')
-
- allow $1 giftd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_giftd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive giftd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_giftd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_giftd_client_packets'($*)) dnl
-
- gen_require(`
- type giftd_client_packet_t;
- ')
-
- dontaudit $1 giftd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_giftd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive giftd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_giftd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_giftd_client_packets'($*)) dnl
-
- corenet_send_giftd_client_packets($1)
- corenet_receive_giftd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_giftd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive giftd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_giftd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_giftd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_giftd_client_packets($1)
- corenet_dontaudit_receive_giftd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_giftd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to giftd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_giftd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_giftd_client_packets'($*)) dnl
-
- gen_require(`
- type giftd_client_packet_t;
- ')
-
- allow $1 giftd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_giftd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send giftd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_giftd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_giftd_server_packets'($*)) dnl
-
- gen_require(`
- type giftd_server_packet_t;
- ')
-
- allow $1 giftd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_giftd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send giftd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_giftd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_giftd_server_packets'($*)) dnl
-
- gen_require(`
- type giftd_server_packet_t;
- ')
-
- dontaudit $1 giftd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_giftd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive giftd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_giftd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_giftd_server_packets'($*)) dnl
-
- gen_require(`
- type giftd_server_packet_t;
- ')
-
- allow $1 giftd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_giftd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive giftd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_giftd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_giftd_server_packets'($*)) dnl
-
- gen_require(`
- type giftd_server_packet_t;
- ')
-
- dontaudit $1 giftd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_giftd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive giftd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_giftd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_giftd_server_packets'($*)) dnl
-
- corenet_send_giftd_server_packets($1)
- corenet_receive_giftd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_giftd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive giftd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_giftd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_giftd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_giftd_server_packets($1)
- corenet_dontaudit_receive_giftd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_giftd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to giftd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_giftd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_giftd_server_packets'($*)) dnl
-
- gen_require(`
- type giftd_server_packet_t;
- ')
-
- allow $1 giftd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_giftd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the git port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_git_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_git_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_git_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the git port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_git_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_git_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_git_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the git port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_git_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_git_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_git_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the git port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_git_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_git_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_git_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the git port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_git_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_git_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_git_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the git port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_git_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_git_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_git_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the git port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_git_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_git_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_git_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the git port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_git_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_git_port'($*)) dnl
-
- gen_require(`
- type git_port_t;
- ')
-
- allow $1 git_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_git_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the git port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_git_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_git_port'($*)) dnl
-
- gen_require(`
- type git_port_t;
- ')
-
- allow $1 git_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_git_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the git port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_git_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_git_port'($*)) dnl
-
- gen_require(`
- type git_port_t;
- ')
-
- allow $1 git_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_git_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send git_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_git_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_git_client_packets'($*)) dnl
-
- gen_require(`
- type git_client_packet_t;
- ')
-
- allow $1 git_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_git_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send git_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_git_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_git_client_packets'($*)) dnl
-
- gen_require(`
- type git_client_packet_t;
- ')
-
- dontaudit $1 git_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_git_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive git_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_git_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_git_client_packets'($*)) dnl
-
- gen_require(`
- type git_client_packet_t;
- ')
-
- allow $1 git_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_git_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive git_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_git_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_git_client_packets'($*)) dnl
-
- gen_require(`
- type git_client_packet_t;
- ')
-
- dontaudit $1 git_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_git_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive git_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_git_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_git_client_packets'($*)) dnl
-
- corenet_send_git_client_packets($1)
- corenet_receive_git_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_git_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive git_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_git_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_git_client_packets'($*)) dnl
-
- corenet_dontaudit_send_git_client_packets($1)
- corenet_dontaudit_receive_git_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_git_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to git_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_git_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_git_client_packets'($*)) dnl
-
- gen_require(`
- type git_client_packet_t;
- ')
-
- allow $1 git_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_git_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send git_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_git_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_git_server_packets'($*)) dnl
-
- gen_require(`
- type git_server_packet_t;
- ')
-
- allow $1 git_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_git_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send git_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_git_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_git_server_packets'($*)) dnl
-
- gen_require(`
- type git_server_packet_t;
- ')
-
- dontaudit $1 git_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_git_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive git_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_git_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_git_server_packets'($*)) dnl
-
- gen_require(`
- type git_server_packet_t;
- ')
-
- allow $1 git_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_git_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive git_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_git_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_git_server_packets'($*)) dnl
-
- gen_require(`
- type git_server_packet_t;
- ')
-
- dontaudit $1 git_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_git_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive git_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_git_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_git_server_packets'($*)) dnl
-
- corenet_send_git_server_packets($1)
- corenet_receive_git_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_git_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive git_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_git_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_git_server_packets'($*)) dnl
-
- corenet_dontaudit_send_git_server_packets($1)
- corenet_dontaudit_receive_git_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_git_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to git_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_git_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_git_server_packets'($*)) dnl
-
- gen_require(`
- type git_server_packet_t;
- ')
-
- allow $1 git_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_git_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the glance_registry port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_glance_registry_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_glance_registry_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_glance_registry_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the glance_registry port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_glance_registry_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_glance_registry_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_glance_registry_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the glance_registry port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_glance_registry_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_glance_registry_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_glance_registry_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the glance_registry port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_glance_registry_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_glance_registry_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_glance_registry_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the glance_registry port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_glance_registry_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_glance_registry_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_glance_registry_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the glance_registry port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_glance_registry_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_glance_registry_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_glance_registry_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the glance_registry port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_glance_registry_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_glance_registry_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_glance_registry_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the glance_registry port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_glance_registry_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_glance_registry_port'($*)) dnl
-
- gen_require(`
- type glance_registry_port_t;
- ')
-
- allow $1 glance_registry_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_glance_registry_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the glance_registry port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_glance_registry_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_glance_registry_port'($*)) dnl
-
- gen_require(`
- type glance_registry_port_t;
- ')
-
- allow $1 glance_registry_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_glance_registry_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the glance_registry port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_glance_registry_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_glance_registry_port'($*)) dnl
-
- gen_require(`
- type glance_registry_port_t;
- ')
-
- allow $1 glance_registry_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_glance_registry_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send glance_registry_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_glance_registry_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_glance_registry_client_packets'($*)) dnl
-
- gen_require(`
- type glance_registry_client_packet_t;
- ')
-
- allow $1 glance_registry_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_glance_registry_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send glance_registry_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_glance_registry_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_glance_registry_client_packets'($*)) dnl
-
- gen_require(`
- type glance_registry_client_packet_t;
- ')
-
- dontaudit $1 glance_registry_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_glance_registry_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive glance_registry_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_glance_registry_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_glance_registry_client_packets'($*)) dnl
-
- gen_require(`
- type glance_registry_client_packet_t;
- ')
-
- allow $1 glance_registry_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_glance_registry_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive glance_registry_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_glance_registry_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_glance_registry_client_packets'($*)) dnl
-
- gen_require(`
- type glance_registry_client_packet_t;
- ')
-
- dontaudit $1 glance_registry_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_glance_registry_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive glance_registry_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_glance_registry_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_glance_registry_client_packets'($*)) dnl
-
- corenet_send_glance_registry_client_packets($1)
- corenet_receive_glance_registry_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_glance_registry_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive glance_registry_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_glance_registry_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_glance_registry_client_packets'($*)) dnl
-
- corenet_dontaudit_send_glance_registry_client_packets($1)
- corenet_dontaudit_receive_glance_registry_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_glance_registry_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to glance_registry_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_glance_registry_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_glance_registry_client_packets'($*)) dnl
-
- gen_require(`
- type glance_registry_client_packet_t;
- ')
-
- allow $1 glance_registry_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_glance_registry_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send glance_registry_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_glance_registry_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_glance_registry_server_packets'($*)) dnl
-
- gen_require(`
- type glance_registry_server_packet_t;
- ')
-
- allow $1 glance_registry_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_glance_registry_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send glance_registry_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_glance_registry_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_glance_registry_server_packets'($*)) dnl
-
- gen_require(`
- type glance_registry_server_packet_t;
- ')
-
- dontaudit $1 glance_registry_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_glance_registry_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive glance_registry_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_glance_registry_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_glance_registry_server_packets'($*)) dnl
-
- gen_require(`
- type glance_registry_server_packet_t;
- ')
-
- allow $1 glance_registry_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_glance_registry_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive glance_registry_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_glance_registry_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_glance_registry_server_packets'($*)) dnl
-
- gen_require(`
- type glance_registry_server_packet_t;
- ')
-
- dontaudit $1 glance_registry_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_glance_registry_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive glance_registry_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_glance_registry_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_glance_registry_server_packets'($*)) dnl
-
- corenet_send_glance_registry_server_packets($1)
- corenet_receive_glance_registry_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_glance_registry_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive glance_registry_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_glance_registry_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_glance_registry_server_packets'($*)) dnl
-
- corenet_dontaudit_send_glance_registry_server_packets($1)
- corenet_dontaudit_receive_glance_registry_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_glance_registry_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to glance_registry_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_glance_registry_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_glance_registry_server_packets'($*)) dnl
-
- gen_require(`
- type glance_registry_server_packet_t;
- ')
-
- allow $1 glance_registry_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_glance_registry_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the gopher port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_gopher_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_gopher_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_gopher_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the gopher port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_gopher_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_gopher_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_gopher_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the gopher port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_gopher_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_gopher_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_gopher_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the gopher port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_gopher_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_gopher_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_gopher_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the gopher port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_gopher_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_gopher_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_gopher_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the gopher port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_gopher_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_gopher_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_gopher_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the gopher port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_gopher_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_gopher_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_gopher_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the gopher port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_gopher_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_gopher_port'($*)) dnl
-
- gen_require(`
- type gopher_port_t;
- ')
-
- allow $1 gopher_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_gopher_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the gopher port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_gopher_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_gopher_port'($*)) dnl
-
- gen_require(`
- type gopher_port_t;
- ')
-
- allow $1 gopher_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_gopher_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the gopher port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_gopher_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_gopher_port'($*)) dnl
-
- gen_require(`
- type gopher_port_t;
- ')
-
- allow $1 gopher_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_gopher_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send gopher_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_gopher_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_gopher_client_packets'($*)) dnl
-
- gen_require(`
- type gopher_client_packet_t;
- ')
-
- allow $1 gopher_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_gopher_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send gopher_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_gopher_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_gopher_client_packets'($*)) dnl
-
- gen_require(`
- type gopher_client_packet_t;
- ')
-
- dontaudit $1 gopher_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_gopher_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive gopher_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_gopher_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_gopher_client_packets'($*)) dnl
-
- gen_require(`
- type gopher_client_packet_t;
- ')
-
- allow $1 gopher_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_gopher_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive gopher_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_gopher_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_gopher_client_packets'($*)) dnl
-
- gen_require(`
- type gopher_client_packet_t;
- ')
-
- dontaudit $1 gopher_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_gopher_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive gopher_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_gopher_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_gopher_client_packets'($*)) dnl
-
- corenet_send_gopher_client_packets($1)
- corenet_receive_gopher_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_gopher_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive gopher_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_gopher_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_gopher_client_packets'($*)) dnl
-
- corenet_dontaudit_send_gopher_client_packets($1)
- corenet_dontaudit_receive_gopher_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_gopher_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to gopher_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_gopher_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_gopher_client_packets'($*)) dnl
-
- gen_require(`
- type gopher_client_packet_t;
- ')
-
- allow $1 gopher_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_gopher_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send gopher_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_gopher_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_gopher_server_packets'($*)) dnl
-
- gen_require(`
- type gopher_server_packet_t;
- ')
-
- allow $1 gopher_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_gopher_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send gopher_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_gopher_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_gopher_server_packets'($*)) dnl
-
- gen_require(`
- type gopher_server_packet_t;
- ')
-
- dontaudit $1 gopher_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_gopher_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive gopher_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_gopher_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_gopher_server_packets'($*)) dnl
-
- gen_require(`
- type gopher_server_packet_t;
- ')
-
- allow $1 gopher_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_gopher_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive gopher_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_gopher_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_gopher_server_packets'($*)) dnl
-
- gen_require(`
- type gopher_server_packet_t;
- ')
-
- dontaudit $1 gopher_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_gopher_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive gopher_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_gopher_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_gopher_server_packets'($*)) dnl
-
- corenet_send_gopher_server_packets($1)
- corenet_receive_gopher_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_gopher_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive gopher_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_gopher_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_gopher_server_packets'($*)) dnl
-
- corenet_dontaudit_send_gopher_server_packets($1)
- corenet_dontaudit_receive_gopher_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_gopher_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to gopher_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_gopher_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_gopher_server_packets'($*)) dnl
-
- gen_require(`
- type gopher_server_packet_t;
- ')
-
- allow $1 gopher_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_gopher_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the gpsd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_gpsd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_gpsd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_gpsd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the gpsd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_gpsd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_gpsd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_gpsd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the gpsd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_gpsd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_gpsd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_gpsd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the gpsd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_gpsd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_gpsd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_gpsd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the gpsd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_gpsd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_gpsd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_gpsd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the gpsd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_gpsd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_gpsd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_gpsd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the gpsd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_gpsd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_gpsd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_gpsd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the gpsd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_gpsd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_gpsd_port'($*)) dnl
-
- gen_require(`
- type gpsd_port_t;
- ')
-
- allow $1 gpsd_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_gpsd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the gpsd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_gpsd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_gpsd_port'($*)) dnl
-
- gen_require(`
- type gpsd_port_t;
- ')
-
- allow $1 gpsd_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_gpsd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the gpsd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_gpsd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_gpsd_port'($*)) dnl
-
- gen_require(`
- type gpsd_port_t;
- ')
-
- allow $1 gpsd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_gpsd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send gpsd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_gpsd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_gpsd_client_packets'($*)) dnl
-
- gen_require(`
- type gpsd_client_packet_t;
- ')
-
- allow $1 gpsd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_gpsd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send gpsd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_gpsd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_gpsd_client_packets'($*)) dnl
-
- gen_require(`
- type gpsd_client_packet_t;
- ')
-
- dontaudit $1 gpsd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_gpsd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive gpsd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_gpsd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_gpsd_client_packets'($*)) dnl
-
- gen_require(`
- type gpsd_client_packet_t;
- ')
-
- allow $1 gpsd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_gpsd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive gpsd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_gpsd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_gpsd_client_packets'($*)) dnl
-
- gen_require(`
- type gpsd_client_packet_t;
- ')
-
- dontaudit $1 gpsd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_gpsd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive gpsd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_gpsd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_gpsd_client_packets'($*)) dnl
-
- corenet_send_gpsd_client_packets($1)
- corenet_receive_gpsd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_gpsd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive gpsd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_gpsd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_gpsd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_gpsd_client_packets($1)
- corenet_dontaudit_receive_gpsd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_gpsd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to gpsd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_gpsd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_gpsd_client_packets'($*)) dnl
-
- gen_require(`
- type gpsd_client_packet_t;
- ')
-
- allow $1 gpsd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_gpsd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send gpsd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_gpsd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_gpsd_server_packets'($*)) dnl
-
- gen_require(`
- type gpsd_server_packet_t;
- ')
-
- allow $1 gpsd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_gpsd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send gpsd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_gpsd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_gpsd_server_packets'($*)) dnl
-
- gen_require(`
- type gpsd_server_packet_t;
- ')
-
- dontaudit $1 gpsd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_gpsd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive gpsd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_gpsd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_gpsd_server_packets'($*)) dnl
-
- gen_require(`
- type gpsd_server_packet_t;
- ')
-
- allow $1 gpsd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_gpsd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive gpsd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_gpsd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_gpsd_server_packets'($*)) dnl
-
- gen_require(`
- type gpsd_server_packet_t;
- ')
-
- dontaudit $1 gpsd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_gpsd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive gpsd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_gpsd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_gpsd_server_packets'($*)) dnl
-
- corenet_send_gpsd_server_packets($1)
- corenet_receive_gpsd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_gpsd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive gpsd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_gpsd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_gpsd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_gpsd_server_packets($1)
- corenet_dontaudit_receive_gpsd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_gpsd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to gpsd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_gpsd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_gpsd_server_packets'($*)) dnl
-
- gen_require(`
- type gpsd_server_packet_t;
- ')
-
- allow $1 gpsd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_gpsd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the hadoop_datanode port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_hadoop_datanode_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_hadoop_datanode_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_hadoop_datanode_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the hadoop_datanode port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_hadoop_datanode_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_hadoop_datanode_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_hadoop_datanode_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the hadoop_datanode port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_hadoop_datanode_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_hadoop_datanode_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_hadoop_datanode_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the hadoop_datanode port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_hadoop_datanode_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_hadoop_datanode_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_hadoop_datanode_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the hadoop_datanode port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_hadoop_datanode_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_hadoop_datanode_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_hadoop_datanode_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the hadoop_datanode port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_hadoop_datanode_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_hadoop_datanode_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_hadoop_datanode_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the hadoop_datanode port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_hadoop_datanode_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_hadoop_datanode_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_hadoop_datanode_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the hadoop_datanode port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_hadoop_datanode_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_hadoop_datanode_port'($*)) dnl
-
- gen_require(`
- type hadoop_datanode_port_t;
- ')
-
- allow $1 hadoop_datanode_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_hadoop_datanode_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the hadoop_datanode port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_hadoop_datanode_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_hadoop_datanode_port'($*)) dnl
-
- gen_require(`
- type hadoop_datanode_port_t;
- ')
-
- allow $1 hadoop_datanode_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_hadoop_datanode_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the hadoop_datanode port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_hadoop_datanode_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_hadoop_datanode_port'($*)) dnl
-
- gen_require(`
- type hadoop_datanode_port_t;
- ')
-
- allow $1 hadoop_datanode_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_hadoop_datanode_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send hadoop_datanode_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_hadoop_datanode_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_hadoop_datanode_client_packets'($*)) dnl
-
- gen_require(`
- type hadoop_datanode_client_packet_t;
- ')
-
- allow $1 hadoop_datanode_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_hadoop_datanode_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send hadoop_datanode_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_hadoop_datanode_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_hadoop_datanode_client_packets'($*)) dnl
-
- gen_require(`
- type hadoop_datanode_client_packet_t;
- ')
-
- dontaudit $1 hadoop_datanode_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_hadoop_datanode_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive hadoop_datanode_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_hadoop_datanode_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_hadoop_datanode_client_packets'($*)) dnl
-
- gen_require(`
- type hadoop_datanode_client_packet_t;
- ')
-
- allow $1 hadoop_datanode_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_hadoop_datanode_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive hadoop_datanode_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_hadoop_datanode_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_hadoop_datanode_client_packets'($*)) dnl
-
- gen_require(`
- type hadoop_datanode_client_packet_t;
- ')
-
- dontaudit $1 hadoop_datanode_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_hadoop_datanode_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive hadoop_datanode_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_hadoop_datanode_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_hadoop_datanode_client_packets'($*)) dnl
-
- corenet_send_hadoop_datanode_client_packets($1)
- corenet_receive_hadoop_datanode_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_hadoop_datanode_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive hadoop_datanode_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_hadoop_datanode_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_hadoop_datanode_client_packets'($*)) dnl
-
- corenet_dontaudit_send_hadoop_datanode_client_packets($1)
- corenet_dontaudit_receive_hadoop_datanode_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_hadoop_datanode_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to hadoop_datanode_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_hadoop_datanode_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_hadoop_datanode_client_packets'($*)) dnl
-
- gen_require(`
- type hadoop_datanode_client_packet_t;
- ')
-
- allow $1 hadoop_datanode_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_hadoop_datanode_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send hadoop_datanode_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_hadoop_datanode_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_hadoop_datanode_server_packets'($*)) dnl
-
- gen_require(`
- type hadoop_datanode_server_packet_t;
- ')
-
- allow $1 hadoop_datanode_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_hadoop_datanode_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send hadoop_datanode_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_hadoop_datanode_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_hadoop_datanode_server_packets'($*)) dnl
-
- gen_require(`
- type hadoop_datanode_server_packet_t;
- ')
-
- dontaudit $1 hadoop_datanode_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_hadoop_datanode_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive hadoop_datanode_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_hadoop_datanode_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_hadoop_datanode_server_packets'($*)) dnl
-
- gen_require(`
- type hadoop_datanode_server_packet_t;
- ')
-
- allow $1 hadoop_datanode_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_hadoop_datanode_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive hadoop_datanode_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_hadoop_datanode_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_hadoop_datanode_server_packets'($*)) dnl
-
- gen_require(`
- type hadoop_datanode_server_packet_t;
- ')
-
- dontaudit $1 hadoop_datanode_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_hadoop_datanode_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive hadoop_datanode_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_hadoop_datanode_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_hadoop_datanode_server_packets'($*)) dnl
-
- corenet_send_hadoop_datanode_server_packets($1)
- corenet_receive_hadoop_datanode_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_hadoop_datanode_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive hadoop_datanode_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_hadoop_datanode_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_hadoop_datanode_server_packets'($*)) dnl
-
- corenet_dontaudit_send_hadoop_datanode_server_packets($1)
- corenet_dontaudit_receive_hadoop_datanode_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_hadoop_datanode_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to hadoop_datanode_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_hadoop_datanode_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_hadoop_datanode_server_packets'($*)) dnl
-
- gen_require(`
- type hadoop_datanode_server_packet_t;
- ')
-
- allow $1 hadoop_datanode_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_hadoop_datanode_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the hadoop_namenode port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_hadoop_namenode_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_hadoop_namenode_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_hadoop_namenode_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the hadoop_namenode port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_hadoop_namenode_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_hadoop_namenode_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_hadoop_namenode_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the hadoop_namenode port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_hadoop_namenode_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_hadoop_namenode_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_hadoop_namenode_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the hadoop_namenode port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_hadoop_namenode_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_hadoop_namenode_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_hadoop_namenode_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the hadoop_namenode port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_hadoop_namenode_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_hadoop_namenode_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_hadoop_namenode_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the hadoop_namenode port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_hadoop_namenode_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_hadoop_namenode_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_hadoop_namenode_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the hadoop_namenode port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_hadoop_namenode_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_hadoop_namenode_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_hadoop_namenode_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the hadoop_namenode port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_hadoop_namenode_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_hadoop_namenode_port'($*)) dnl
-
- gen_require(`
- type hadoop_namenode_port_t;
- ')
-
- allow $1 hadoop_namenode_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_hadoop_namenode_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the hadoop_namenode port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_hadoop_namenode_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_hadoop_namenode_port'($*)) dnl
-
- gen_require(`
- type hadoop_namenode_port_t;
- ')
-
- allow $1 hadoop_namenode_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_hadoop_namenode_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the hadoop_namenode port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_hadoop_namenode_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_hadoop_namenode_port'($*)) dnl
-
- gen_require(`
- type hadoop_namenode_port_t;
- ')
-
- allow $1 hadoop_namenode_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_hadoop_namenode_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send hadoop_namenode_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_hadoop_namenode_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_hadoop_namenode_client_packets'($*)) dnl
-
- gen_require(`
- type hadoop_namenode_client_packet_t;
- ')
-
- allow $1 hadoop_namenode_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_hadoop_namenode_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send hadoop_namenode_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_hadoop_namenode_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_hadoop_namenode_client_packets'($*)) dnl
-
- gen_require(`
- type hadoop_namenode_client_packet_t;
- ')
-
- dontaudit $1 hadoop_namenode_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_hadoop_namenode_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive hadoop_namenode_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_hadoop_namenode_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_hadoop_namenode_client_packets'($*)) dnl
-
- gen_require(`
- type hadoop_namenode_client_packet_t;
- ')
-
- allow $1 hadoop_namenode_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_hadoop_namenode_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive hadoop_namenode_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_hadoop_namenode_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_hadoop_namenode_client_packets'($*)) dnl
-
- gen_require(`
- type hadoop_namenode_client_packet_t;
- ')
-
- dontaudit $1 hadoop_namenode_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_hadoop_namenode_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive hadoop_namenode_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_hadoop_namenode_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_hadoop_namenode_client_packets'($*)) dnl
-
- corenet_send_hadoop_namenode_client_packets($1)
- corenet_receive_hadoop_namenode_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_hadoop_namenode_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive hadoop_namenode_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_hadoop_namenode_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_hadoop_namenode_client_packets'($*)) dnl
-
- corenet_dontaudit_send_hadoop_namenode_client_packets($1)
- corenet_dontaudit_receive_hadoop_namenode_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_hadoop_namenode_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to hadoop_namenode_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_hadoop_namenode_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_hadoop_namenode_client_packets'($*)) dnl
-
- gen_require(`
- type hadoop_namenode_client_packet_t;
- ')
-
- allow $1 hadoop_namenode_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_hadoop_namenode_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send hadoop_namenode_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_hadoop_namenode_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_hadoop_namenode_server_packets'($*)) dnl
-
- gen_require(`
- type hadoop_namenode_server_packet_t;
- ')
-
- allow $1 hadoop_namenode_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_hadoop_namenode_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send hadoop_namenode_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_hadoop_namenode_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_hadoop_namenode_server_packets'($*)) dnl
-
- gen_require(`
- type hadoop_namenode_server_packet_t;
- ')
-
- dontaudit $1 hadoop_namenode_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_hadoop_namenode_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive hadoop_namenode_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_hadoop_namenode_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_hadoop_namenode_server_packets'($*)) dnl
-
- gen_require(`
- type hadoop_namenode_server_packet_t;
- ')
-
- allow $1 hadoop_namenode_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_hadoop_namenode_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive hadoop_namenode_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_hadoop_namenode_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_hadoop_namenode_server_packets'($*)) dnl
-
- gen_require(`
- type hadoop_namenode_server_packet_t;
- ')
-
- dontaudit $1 hadoop_namenode_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_hadoop_namenode_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive hadoop_namenode_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_hadoop_namenode_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_hadoop_namenode_server_packets'($*)) dnl
-
- corenet_send_hadoop_namenode_server_packets($1)
- corenet_receive_hadoop_namenode_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_hadoop_namenode_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive hadoop_namenode_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_hadoop_namenode_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_hadoop_namenode_server_packets'($*)) dnl
-
- corenet_dontaudit_send_hadoop_namenode_server_packets($1)
- corenet_dontaudit_receive_hadoop_namenode_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_hadoop_namenode_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to hadoop_namenode_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_hadoop_namenode_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_hadoop_namenode_server_packets'($*)) dnl
-
- gen_require(`
- type hadoop_namenode_server_packet_t;
- ')
-
- allow $1 hadoop_namenode_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_hadoop_namenode_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the hddtemp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_hddtemp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_hddtemp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_hddtemp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the hddtemp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_hddtemp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_hddtemp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_hddtemp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the hddtemp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_hddtemp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_hddtemp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_hddtemp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the hddtemp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_hddtemp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_hddtemp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_hddtemp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the hddtemp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_hddtemp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_hddtemp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_hddtemp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the hddtemp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_hddtemp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_hddtemp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_hddtemp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the hddtemp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_hddtemp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_hddtemp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_hddtemp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the hddtemp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_hddtemp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_hddtemp_port'($*)) dnl
-
- gen_require(`
- type hddtemp_port_t;
- ')
-
- allow $1 hddtemp_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_hddtemp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the hddtemp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_hddtemp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_hddtemp_port'($*)) dnl
-
- gen_require(`
- type hddtemp_port_t;
- ')
-
- allow $1 hddtemp_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_hddtemp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the hddtemp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_hddtemp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_hddtemp_port'($*)) dnl
-
- gen_require(`
- type hddtemp_port_t;
- ')
-
- allow $1 hddtemp_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_hddtemp_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send hddtemp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_hddtemp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_hddtemp_client_packets'($*)) dnl
-
- gen_require(`
- type hddtemp_client_packet_t;
- ')
-
- allow $1 hddtemp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_hddtemp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send hddtemp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_hddtemp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_hddtemp_client_packets'($*)) dnl
-
- gen_require(`
- type hddtemp_client_packet_t;
- ')
-
- dontaudit $1 hddtemp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_hddtemp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive hddtemp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_hddtemp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_hddtemp_client_packets'($*)) dnl
-
- gen_require(`
- type hddtemp_client_packet_t;
- ')
-
- allow $1 hddtemp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_hddtemp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive hddtemp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_hddtemp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_hddtemp_client_packets'($*)) dnl
-
- gen_require(`
- type hddtemp_client_packet_t;
- ')
-
- dontaudit $1 hddtemp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_hddtemp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive hddtemp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_hddtemp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_hddtemp_client_packets'($*)) dnl
-
- corenet_send_hddtemp_client_packets($1)
- corenet_receive_hddtemp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_hddtemp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive hddtemp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_hddtemp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_hddtemp_client_packets'($*)) dnl
-
- corenet_dontaudit_send_hddtemp_client_packets($1)
- corenet_dontaudit_receive_hddtemp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_hddtemp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to hddtemp_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_hddtemp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_hddtemp_client_packets'($*)) dnl
-
- gen_require(`
- type hddtemp_client_packet_t;
- ')
-
- allow $1 hddtemp_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_hddtemp_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send hddtemp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_hddtemp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_hddtemp_server_packets'($*)) dnl
-
- gen_require(`
- type hddtemp_server_packet_t;
- ')
-
- allow $1 hddtemp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_hddtemp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send hddtemp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_hddtemp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_hddtemp_server_packets'($*)) dnl
-
- gen_require(`
- type hddtemp_server_packet_t;
- ')
-
- dontaudit $1 hddtemp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_hddtemp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive hddtemp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_hddtemp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_hddtemp_server_packets'($*)) dnl
-
- gen_require(`
- type hddtemp_server_packet_t;
- ')
-
- allow $1 hddtemp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_hddtemp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive hddtemp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_hddtemp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_hddtemp_server_packets'($*)) dnl
-
- gen_require(`
- type hddtemp_server_packet_t;
- ')
-
- dontaudit $1 hddtemp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_hddtemp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive hddtemp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_hddtemp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_hddtemp_server_packets'($*)) dnl
-
- corenet_send_hddtemp_server_packets($1)
- corenet_receive_hddtemp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_hddtemp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive hddtemp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_hddtemp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_hddtemp_server_packets'($*)) dnl
-
- corenet_dontaudit_send_hddtemp_server_packets($1)
- corenet_dontaudit_receive_hddtemp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_hddtemp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to hddtemp_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_hddtemp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_hddtemp_server_packets'($*)) dnl
-
- gen_require(`
- type hddtemp_server_packet_t;
- ')
-
- allow $1 hddtemp_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_hddtemp_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the howl port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_howl_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_howl_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_howl_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the howl port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_howl_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_howl_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_howl_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the howl port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_howl_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_howl_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_howl_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the howl port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_howl_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_howl_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_howl_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the howl port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_howl_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_howl_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_howl_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the howl port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_howl_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_howl_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_howl_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the howl port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_howl_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_howl_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_howl_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the howl port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_howl_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_howl_port'($*)) dnl
-
- gen_require(`
- type howl_port_t;
- ')
-
- allow $1 howl_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_howl_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the howl port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_howl_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_howl_port'($*)) dnl
-
- gen_require(`
- type howl_port_t;
- ')
-
- allow $1 howl_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_howl_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the howl port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_howl_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_howl_port'($*)) dnl
-
- gen_require(`
- type howl_port_t;
- ')
-
- allow $1 howl_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_howl_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send howl_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_howl_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_howl_client_packets'($*)) dnl
-
- gen_require(`
- type howl_client_packet_t;
- ')
-
- allow $1 howl_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_howl_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send howl_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_howl_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_howl_client_packets'($*)) dnl
-
- gen_require(`
- type howl_client_packet_t;
- ')
-
- dontaudit $1 howl_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_howl_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive howl_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_howl_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_howl_client_packets'($*)) dnl
-
- gen_require(`
- type howl_client_packet_t;
- ')
-
- allow $1 howl_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_howl_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive howl_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_howl_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_howl_client_packets'($*)) dnl
-
- gen_require(`
- type howl_client_packet_t;
- ')
-
- dontaudit $1 howl_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_howl_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive howl_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_howl_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_howl_client_packets'($*)) dnl
-
- corenet_send_howl_client_packets($1)
- corenet_receive_howl_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_howl_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive howl_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_howl_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_howl_client_packets'($*)) dnl
-
- corenet_dontaudit_send_howl_client_packets($1)
- corenet_dontaudit_receive_howl_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_howl_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to howl_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_howl_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_howl_client_packets'($*)) dnl
-
- gen_require(`
- type howl_client_packet_t;
- ')
-
- allow $1 howl_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_howl_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send howl_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_howl_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_howl_server_packets'($*)) dnl
-
- gen_require(`
- type howl_server_packet_t;
- ')
-
- allow $1 howl_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_howl_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send howl_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_howl_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_howl_server_packets'($*)) dnl
-
- gen_require(`
- type howl_server_packet_t;
- ')
-
- dontaudit $1 howl_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_howl_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive howl_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_howl_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_howl_server_packets'($*)) dnl
-
- gen_require(`
- type howl_server_packet_t;
- ')
-
- allow $1 howl_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_howl_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive howl_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_howl_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_howl_server_packets'($*)) dnl
-
- gen_require(`
- type howl_server_packet_t;
- ')
-
- dontaudit $1 howl_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_howl_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive howl_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_howl_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_howl_server_packets'($*)) dnl
-
- corenet_send_howl_server_packets($1)
- corenet_receive_howl_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_howl_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive howl_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_howl_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_howl_server_packets'($*)) dnl
-
- corenet_dontaudit_send_howl_server_packets($1)
- corenet_dontaudit_receive_howl_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_howl_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to howl_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_howl_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_howl_server_packets'($*)) dnl
-
- gen_require(`
- type howl_server_packet_t;
- ')
-
- allow $1 howl_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_howl_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the hplip port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_hplip_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_hplip_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_hplip_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the hplip port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_hplip_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_hplip_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_hplip_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the hplip port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_hplip_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_hplip_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_hplip_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the hplip port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_hplip_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_hplip_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_hplip_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the hplip port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_hplip_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_hplip_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_hplip_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the hplip port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_hplip_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_hplip_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_hplip_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the hplip port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_hplip_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_hplip_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_hplip_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the hplip port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_hplip_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_hplip_port'($*)) dnl
-
- gen_require(`
- type hplip_port_t;
- ')
-
- allow $1 hplip_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_hplip_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the hplip port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_hplip_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_hplip_port'($*)) dnl
-
- gen_require(`
- type hplip_port_t;
- ')
-
- allow $1 hplip_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_hplip_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the hplip port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_hplip_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_hplip_port'($*)) dnl
-
- gen_require(`
- type hplip_port_t;
- ')
-
- allow $1 hplip_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_hplip_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send hplip_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_hplip_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_hplip_client_packets'($*)) dnl
-
- gen_require(`
- type hplip_client_packet_t;
- ')
-
- allow $1 hplip_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_hplip_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send hplip_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_hplip_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_hplip_client_packets'($*)) dnl
-
- gen_require(`
- type hplip_client_packet_t;
- ')
-
- dontaudit $1 hplip_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_hplip_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive hplip_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_hplip_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_hplip_client_packets'($*)) dnl
-
- gen_require(`
- type hplip_client_packet_t;
- ')
-
- allow $1 hplip_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_hplip_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive hplip_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_hplip_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_hplip_client_packets'($*)) dnl
-
- gen_require(`
- type hplip_client_packet_t;
- ')
-
- dontaudit $1 hplip_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_hplip_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive hplip_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_hplip_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_hplip_client_packets'($*)) dnl
-
- corenet_send_hplip_client_packets($1)
- corenet_receive_hplip_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_hplip_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive hplip_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_hplip_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_hplip_client_packets'($*)) dnl
-
- corenet_dontaudit_send_hplip_client_packets($1)
- corenet_dontaudit_receive_hplip_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_hplip_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to hplip_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_hplip_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_hplip_client_packets'($*)) dnl
-
- gen_require(`
- type hplip_client_packet_t;
- ')
-
- allow $1 hplip_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_hplip_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send hplip_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_hplip_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_hplip_server_packets'($*)) dnl
-
- gen_require(`
- type hplip_server_packet_t;
- ')
-
- allow $1 hplip_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_hplip_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send hplip_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_hplip_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_hplip_server_packets'($*)) dnl
-
- gen_require(`
- type hplip_server_packet_t;
- ')
-
- dontaudit $1 hplip_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_hplip_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive hplip_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_hplip_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_hplip_server_packets'($*)) dnl
-
- gen_require(`
- type hplip_server_packet_t;
- ')
-
- allow $1 hplip_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_hplip_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive hplip_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_hplip_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_hplip_server_packets'($*)) dnl
-
- gen_require(`
- type hplip_server_packet_t;
- ')
-
- dontaudit $1 hplip_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_hplip_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive hplip_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_hplip_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_hplip_server_packets'($*)) dnl
-
- corenet_send_hplip_server_packets($1)
- corenet_receive_hplip_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_hplip_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive hplip_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_hplip_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_hplip_server_packets'($*)) dnl
-
- corenet_dontaudit_send_hplip_server_packets($1)
- corenet_dontaudit_receive_hplip_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_hplip_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to hplip_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_hplip_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_hplip_server_packets'($*)) dnl
-
- gen_require(`
- type hplip_server_packet_t;
- ')
-
- allow $1 hplip_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_hplip_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the http port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_http_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_http_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_http_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the http port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_http_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_http_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_http_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the http port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_http_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_http_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_http_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the http port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_http_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_http_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_http_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the http port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_http_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_http_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_http_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the http port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_http_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_http_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_http_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the http port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_http_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_http_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_http_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the http port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_http_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_http_port'($*)) dnl
-
- gen_require(`
- type http_port_t;
- ')
-
- allow $1 http_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_http_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the http port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_http_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_http_port'($*)) dnl
-
- gen_require(`
- type http_port_t;
- ')
-
- allow $1 http_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_http_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the http port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_http_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_http_port'($*)) dnl
-
- gen_require(`
- type http_port_t;
- ')
-
- allow $1 http_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_http_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send http_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_http_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_http_client_packets'($*)) dnl
-
- gen_require(`
- type http_client_packet_t;
- ')
-
- allow $1 http_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_http_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send http_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_http_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_http_client_packets'($*)) dnl
-
- gen_require(`
- type http_client_packet_t;
- ')
-
- dontaudit $1 http_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_http_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive http_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_http_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_http_client_packets'($*)) dnl
-
- gen_require(`
- type http_client_packet_t;
- ')
-
- allow $1 http_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_http_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive http_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_http_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_http_client_packets'($*)) dnl
-
- gen_require(`
- type http_client_packet_t;
- ')
-
- dontaudit $1 http_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_http_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive http_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_http_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_http_client_packets'($*)) dnl
-
- corenet_send_http_client_packets($1)
- corenet_receive_http_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_http_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive http_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_http_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_http_client_packets'($*)) dnl
-
- corenet_dontaudit_send_http_client_packets($1)
- corenet_dontaudit_receive_http_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_http_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to http_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_http_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_http_client_packets'($*)) dnl
-
- gen_require(`
- type http_client_packet_t;
- ')
-
- allow $1 http_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_http_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send http_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_http_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_http_server_packets'($*)) dnl
-
- gen_require(`
- type http_server_packet_t;
- ')
-
- allow $1 http_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_http_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send http_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_http_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_http_server_packets'($*)) dnl
-
- gen_require(`
- type http_server_packet_t;
- ')
-
- dontaudit $1 http_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_http_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive http_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_http_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_http_server_packets'($*)) dnl
-
- gen_require(`
- type http_server_packet_t;
- ')
-
- allow $1 http_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_http_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive http_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_http_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_http_server_packets'($*)) dnl
-
- gen_require(`
- type http_server_packet_t;
- ')
-
- dontaudit $1 http_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_http_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive http_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_http_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_http_server_packets'($*)) dnl
-
- corenet_send_http_server_packets($1)
- corenet_receive_http_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_http_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive http_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_http_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_http_server_packets'($*)) dnl
-
- corenet_dontaudit_send_http_server_packets($1)
- corenet_dontaudit_receive_http_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_http_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to http_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_http_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_http_server_packets'($*)) dnl
-
- gen_require(`
- type http_server_packet_t;
- ')
-
- allow $1 http_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_http_server_packets'($*)) dnl
- ')
-
-
- #8443 is mod_nss default port
-
-
-########################################
-##
-## Send and receive TCP traffic on the http_cache port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_http_cache_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_http_cache_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_http_cache_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the http_cache port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_http_cache_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_http_cache_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_http_cache_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the http_cache port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_http_cache_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_http_cache_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_http_cache_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the http_cache port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_http_cache_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_http_cache_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_http_cache_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the http_cache port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_http_cache_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_http_cache_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_http_cache_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the http_cache port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_http_cache_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_http_cache_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_http_cache_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the http_cache port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_http_cache_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_http_cache_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_http_cache_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the http_cache port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_http_cache_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_http_cache_port'($*)) dnl
-
- gen_require(`
- type http_cache_port_t;
- ')
-
- allow $1 http_cache_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_http_cache_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the http_cache port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_http_cache_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_http_cache_port'($*)) dnl
-
- gen_require(`
- type http_cache_port_t;
- ')
-
- allow $1 http_cache_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_http_cache_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the http_cache port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_http_cache_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_http_cache_port'($*)) dnl
-
- gen_require(`
- type http_cache_port_t;
- ')
-
- allow $1 http_cache_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_http_cache_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send http_cache_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_http_cache_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_http_cache_client_packets'($*)) dnl
-
- gen_require(`
- type http_cache_client_packet_t;
- ')
-
- allow $1 http_cache_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_http_cache_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send http_cache_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_http_cache_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_http_cache_client_packets'($*)) dnl
-
- gen_require(`
- type http_cache_client_packet_t;
- ')
-
- dontaudit $1 http_cache_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_http_cache_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive http_cache_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_http_cache_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_http_cache_client_packets'($*)) dnl
-
- gen_require(`
- type http_cache_client_packet_t;
- ')
-
- allow $1 http_cache_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_http_cache_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive http_cache_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_http_cache_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_http_cache_client_packets'($*)) dnl
-
- gen_require(`
- type http_cache_client_packet_t;
- ')
-
- dontaudit $1 http_cache_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_http_cache_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive http_cache_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_http_cache_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_http_cache_client_packets'($*)) dnl
-
- corenet_send_http_cache_client_packets($1)
- corenet_receive_http_cache_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_http_cache_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive http_cache_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_http_cache_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_http_cache_client_packets'($*)) dnl
-
- corenet_dontaudit_send_http_cache_client_packets($1)
- corenet_dontaudit_receive_http_cache_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_http_cache_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to http_cache_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_http_cache_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_http_cache_client_packets'($*)) dnl
-
- gen_require(`
- type http_cache_client_packet_t;
- ')
-
- allow $1 http_cache_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_http_cache_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send http_cache_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_http_cache_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_http_cache_server_packets'($*)) dnl
-
- gen_require(`
- type http_cache_server_packet_t;
- ')
-
- allow $1 http_cache_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_http_cache_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send http_cache_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_http_cache_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_http_cache_server_packets'($*)) dnl
-
- gen_require(`
- type http_cache_server_packet_t;
- ')
-
- dontaudit $1 http_cache_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_http_cache_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive http_cache_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_http_cache_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_http_cache_server_packets'($*)) dnl
-
- gen_require(`
- type http_cache_server_packet_t;
- ')
-
- allow $1 http_cache_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_http_cache_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive http_cache_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_http_cache_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_http_cache_server_packets'($*)) dnl
-
- gen_require(`
- type http_cache_server_packet_t;
- ')
-
- dontaudit $1 http_cache_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_http_cache_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive http_cache_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_http_cache_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_http_cache_server_packets'($*)) dnl
-
- corenet_send_http_cache_server_packets($1)
- corenet_receive_http_cache_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_http_cache_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive http_cache_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_http_cache_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_http_cache_server_packets'($*)) dnl
-
- corenet_dontaudit_send_http_cache_server_packets($1)
- corenet_dontaudit_receive_http_cache_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_http_cache_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to http_cache_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_http_cache_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_http_cache_server_packets'($*)) dnl
-
- gen_require(`
- type http_cache_server_packet_t;
- ')
-
- allow $1 http_cache_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_http_cache_server_packets'($*)) dnl
- ')
-
-
- # 8118 is for privoxy
-
-
-########################################
-##
-## Send and receive TCP traffic on the i18n_input port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_i18n_input_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_i18n_input_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_i18n_input_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the i18n_input port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_i18n_input_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_i18n_input_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_i18n_input_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the i18n_input port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_i18n_input_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_i18n_input_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_i18n_input_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the i18n_input port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_i18n_input_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_i18n_input_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_i18n_input_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the i18n_input port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_i18n_input_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_i18n_input_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_i18n_input_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the i18n_input port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_i18n_input_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_i18n_input_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_i18n_input_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the i18n_input port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_i18n_input_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_i18n_input_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_i18n_input_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the i18n_input port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_i18n_input_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_i18n_input_port'($*)) dnl
-
- gen_require(`
- type i18n_input_port_t;
- ')
-
- allow $1 i18n_input_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_i18n_input_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the i18n_input port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_i18n_input_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_i18n_input_port'($*)) dnl
-
- gen_require(`
- type i18n_input_port_t;
- ')
-
- allow $1 i18n_input_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_i18n_input_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the i18n_input port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_i18n_input_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_i18n_input_port'($*)) dnl
-
- gen_require(`
- type i18n_input_port_t;
- ')
-
- allow $1 i18n_input_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_i18n_input_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send i18n_input_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_i18n_input_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_i18n_input_client_packets'($*)) dnl
-
- gen_require(`
- type i18n_input_client_packet_t;
- ')
-
- allow $1 i18n_input_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_i18n_input_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send i18n_input_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_i18n_input_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_i18n_input_client_packets'($*)) dnl
-
- gen_require(`
- type i18n_input_client_packet_t;
- ')
-
- dontaudit $1 i18n_input_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_i18n_input_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive i18n_input_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_i18n_input_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_i18n_input_client_packets'($*)) dnl
-
- gen_require(`
- type i18n_input_client_packet_t;
- ')
-
- allow $1 i18n_input_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_i18n_input_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive i18n_input_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_i18n_input_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_i18n_input_client_packets'($*)) dnl
-
- gen_require(`
- type i18n_input_client_packet_t;
- ')
-
- dontaudit $1 i18n_input_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_i18n_input_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive i18n_input_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_i18n_input_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_i18n_input_client_packets'($*)) dnl
-
- corenet_send_i18n_input_client_packets($1)
- corenet_receive_i18n_input_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_i18n_input_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive i18n_input_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_i18n_input_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_i18n_input_client_packets'($*)) dnl
-
- corenet_dontaudit_send_i18n_input_client_packets($1)
- corenet_dontaudit_receive_i18n_input_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_i18n_input_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to i18n_input_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_i18n_input_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_i18n_input_client_packets'($*)) dnl
-
- gen_require(`
- type i18n_input_client_packet_t;
- ')
-
- allow $1 i18n_input_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_i18n_input_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send i18n_input_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_i18n_input_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_i18n_input_server_packets'($*)) dnl
-
- gen_require(`
- type i18n_input_server_packet_t;
- ')
-
- allow $1 i18n_input_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_i18n_input_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send i18n_input_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_i18n_input_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_i18n_input_server_packets'($*)) dnl
-
- gen_require(`
- type i18n_input_server_packet_t;
- ')
-
- dontaudit $1 i18n_input_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_i18n_input_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive i18n_input_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_i18n_input_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_i18n_input_server_packets'($*)) dnl
-
- gen_require(`
- type i18n_input_server_packet_t;
- ')
-
- allow $1 i18n_input_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_i18n_input_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive i18n_input_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_i18n_input_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_i18n_input_server_packets'($*)) dnl
-
- gen_require(`
- type i18n_input_server_packet_t;
- ')
-
- dontaudit $1 i18n_input_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_i18n_input_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive i18n_input_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_i18n_input_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_i18n_input_server_packets'($*)) dnl
-
- corenet_send_i18n_input_server_packets($1)
- corenet_receive_i18n_input_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_i18n_input_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive i18n_input_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_i18n_input_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_i18n_input_server_packets'($*)) dnl
-
- corenet_dontaudit_send_i18n_input_server_packets($1)
- corenet_dontaudit_receive_i18n_input_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_i18n_input_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to i18n_input_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_i18n_input_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_i18n_input_server_packets'($*)) dnl
-
- gen_require(`
- type i18n_input_server_packet_t;
- ')
-
- allow $1 i18n_input_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_i18n_input_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the imaze port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_imaze_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_imaze_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_imaze_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the imaze port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_imaze_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_imaze_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_imaze_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the imaze port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_imaze_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_imaze_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_imaze_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the imaze port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_imaze_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_imaze_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_imaze_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the imaze port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_imaze_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_imaze_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_imaze_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the imaze port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_imaze_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_imaze_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_imaze_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the imaze port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_imaze_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_imaze_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_imaze_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the imaze port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_imaze_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_imaze_port'($*)) dnl
-
- gen_require(`
- type imaze_port_t;
- ')
-
- allow $1 imaze_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_imaze_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the imaze port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_imaze_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_imaze_port'($*)) dnl
-
- gen_require(`
- type imaze_port_t;
- ')
-
- allow $1 imaze_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_imaze_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the imaze port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_imaze_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_imaze_port'($*)) dnl
-
- gen_require(`
- type imaze_port_t;
- ')
-
- allow $1 imaze_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_imaze_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send imaze_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_imaze_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_imaze_client_packets'($*)) dnl
-
- gen_require(`
- type imaze_client_packet_t;
- ')
-
- allow $1 imaze_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_imaze_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send imaze_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_imaze_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_imaze_client_packets'($*)) dnl
-
- gen_require(`
- type imaze_client_packet_t;
- ')
-
- dontaudit $1 imaze_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_imaze_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive imaze_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_imaze_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_imaze_client_packets'($*)) dnl
-
- gen_require(`
- type imaze_client_packet_t;
- ')
-
- allow $1 imaze_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_imaze_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive imaze_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_imaze_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_imaze_client_packets'($*)) dnl
-
- gen_require(`
- type imaze_client_packet_t;
- ')
-
- dontaudit $1 imaze_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_imaze_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive imaze_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_imaze_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_imaze_client_packets'($*)) dnl
-
- corenet_send_imaze_client_packets($1)
- corenet_receive_imaze_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_imaze_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive imaze_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_imaze_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_imaze_client_packets'($*)) dnl
-
- corenet_dontaudit_send_imaze_client_packets($1)
- corenet_dontaudit_receive_imaze_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_imaze_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to imaze_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_imaze_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_imaze_client_packets'($*)) dnl
-
- gen_require(`
- type imaze_client_packet_t;
- ')
-
- allow $1 imaze_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_imaze_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send imaze_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_imaze_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_imaze_server_packets'($*)) dnl
-
- gen_require(`
- type imaze_server_packet_t;
- ')
-
- allow $1 imaze_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_imaze_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send imaze_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_imaze_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_imaze_server_packets'($*)) dnl
-
- gen_require(`
- type imaze_server_packet_t;
- ')
-
- dontaudit $1 imaze_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_imaze_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive imaze_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_imaze_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_imaze_server_packets'($*)) dnl
-
- gen_require(`
- type imaze_server_packet_t;
- ')
-
- allow $1 imaze_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_imaze_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive imaze_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_imaze_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_imaze_server_packets'($*)) dnl
-
- gen_require(`
- type imaze_server_packet_t;
- ')
-
- dontaudit $1 imaze_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_imaze_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive imaze_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_imaze_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_imaze_server_packets'($*)) dnl
-
- corenet_send_imaze_server_packets($1)
- corenet_receive_imaze_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_imaze_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive imaze_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_imaze_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_imaze_server_packets'($*)) dnl
-
- corenet_dontaudit_send_imaze_server_packets($1)
- corenet_dontaudit_receive_imaze_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_imaze_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to imaze_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_imaze_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_imaze_server_packets'($*)) dnl
-
- gen_require(`
- type imaze_server_packet_t;
- ')
-
- allow $1 imaze_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_imaze_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the inetd_child port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_inetd_child_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_inetd_child_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_inetd_child_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the inetd_child port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_inetd_child_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_inetd_child_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_inetd_child_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the inetd_child port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_inetd_child_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_inetd_child_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_inetd_child_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the inetd_child port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_inetd_child_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_inetd_child_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_inetd_child_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the inetd_child port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_inetd_child_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_inetd_child_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_inetd_child_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the inetd_child port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_inetd_child_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_inetd_child_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_inetd_child_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the inetd_child port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_inetd_child_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_inetd_child_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_inetd_child_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the inetd_child port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_inetd_child_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_inetd_child_port'($*)) dnl
-
- gen_require(`
- type inetd_child_port_t;
- ')
-
- allow $1 inetd_child_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_inetd_child_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the inetd_child port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_inetd_child_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_inetd_child_port'($*)) dnl
-
- gen_require(`
- type inetd_child_port_t;
- ')
-
- allow $1 inetd_child_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_inetd_child_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the inetd_child port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_inetd_child_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_inetd_child_port'($*)) dnl
-
- gen_require(`
- type inetd_child_port_t;
- ')
-
- allow $1 inetd_child_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_inetd_child_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send inetd_child_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_inetd_child_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_inetd_child_client_packets'($*)) dnl
-
- gen_require(`
- type inetd_child_client_packet_t;
- ')
-
- allow $1 inetd_child_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_inetd_child_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send inetd_child_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_inetd_child_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_inetd_child_client_packets'($*)) dnl
-
- gen_require(`
- type inetd_child_client_packet_t;
- ')
-
- dontaudit $1 inetd_child_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_inetd_child_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive inetd_child_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_inetd_child_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_inetd_child_client_packets'($*)) dnl
-
- gen_require(`
- type inetd_child_client_packet_t;
- ')
-
- allow $1 inetd_child_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_inetd_child_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive inetd_child_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_inetd_child_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_inetd_child_client_packets'($*)) dnl
-
- gen_require(`
- type inetd_child_client_packet_t;
- ')
-
- dontaudit $1 inetd_child_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_inetd_child_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive inetd_child_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_inetd_child_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_inetd_child_client_packets'($*)) dnl
-
- corenet_send_inetd_child_client_packets($1)
- corenet_receive_inetd_child_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_inetd_child_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive inetd_child_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_inetd_child_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_inetd_child_client_packets'($*)) dnl
-
- corenet_dontaudit_send_inetd_child_client_packets($1)
- corenet_dontaudit_receive_inetd_child_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_inetd_child_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to inetd_child_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_inetd_child_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_inetd_child_client_packets'($*)) dnl
-
- gen_require(`
- type inetd_child_client_packet_t;
- ')
-
- allow $1 inetd_child_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_inetd_child_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send inetd_child_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_inetd_child_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_inetd_child_server_packets'($*)) dnl
-
- gen_require(`
- type inetd_child_server_packet_t;
- ')
-
- allow $1 inetd_child_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_inetd_child_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send inetd_child_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_inetd_child_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_inetd_child_server_packets'($*)) dnl
-
- gen_require(`
- type inetd_child_server_packet_t;
- ')
-
- dontaudit $1 inetd_child_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_inetd_child_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive inetd_child_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_inetd_child_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_inetd_child_server_packets'($*)) dnl
-
- gen_require(`
- type inetd_child_server_packet_t;
- ')
-
- allow $1 inetd_child_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_inetd_child_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive inetd_child_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_inetd_child_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_inetd_child_server_packets'($*)) dnl
-
- gen_require(`
- type inetd_child_server_packet_t;
- ')
-
- dontaudit $1 inetd_child_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_inetd_child_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive inetd_child_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_inetd_child_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_inetd_child_server_packets'($*)) dnl
-
- corenet_send_inetd_child_server_packets($1)
- corenet_receive_inetd_child_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_inetd_child_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive inetd_child_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_inetd_child_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_inetd_child_server_packets'($*)) dnl
-
- corenet_dontaudit_send_inetd_child_server_packets($1)
- corenet_dontaudit_receive_inetd_child_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_inetd_child_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to inetd_child_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_inetd_child_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_inetd_child_server_packets'($*)) dnl
-
- gen_require(`
- type inetd_child_server_packet_t;
- ')
-
- allow $1 inetd_child_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_inetd_child_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the innd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_innd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_innd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_innd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the innd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_innd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_innd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_innd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the innd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_innd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_innd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_innd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the innd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_innd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_innd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_innd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the innd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_innd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_innd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_innd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the innd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_innd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_innd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_innd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the innd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_innd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_innd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_innd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the innd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_innd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_innd_port'($*)) dnl
-
- gen_require(`
- type innd_port_t;
- ')
-
- allow $1 innd_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_innd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the innd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_innd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_innd_port'($*)) dnl
-
- gen_require(`
- type innd_port_t;
- ')
-
- allow $1 innd_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_innd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the innd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_innd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_innd_port'($*)) dnl
-
- gen_require(`
- type innd_port_t;
- ')
-
- allow $1 innd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_innd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send innd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_innd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_innd_client_packets'($*)) dnl
-
- gen_require(`
- type innd_client_packet_t;
- ')
-
- allow $1 innd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_innd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send innd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_innd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_innd_client_packets'($*)) dnl
-
- gen_require(`
- type innd_client_packet_t;
- ')
-
- dontaudit $1 innd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_innd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive innd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_innd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_innd_client_packets'($*)) dnl
-
- gen_require(`
- type innd_client_packet_t;
- ')
-
- allow $1 innd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_innd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive innd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_innd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_innd_client_packets'($*)) dnl
-
- gen_require(`
- type innd_client_packet_t;
- ')
-
- dontaudit $1 innd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_innd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive innd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_innd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_innd_client_packets'($*)) dnl
-
- corenet_send_innd_client_packets($1)
- corenet_receive_innd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_innd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive innd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_innd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_innd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_innd_client_packets($1)
- corenet_dontaudit_receive_innd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_innd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to innd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_innd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_innd_client_packets'($*)) dnl
-
- gen_require(`
- type innd_client_packet_t;
- ')
-
- allow $1 innd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_innd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send innd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_innd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_innd_server_packets'($*)) dnl
-
- gen_require(`
- type innd_server_packet_t;
- ')
-
- allow $1 innd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_innd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send innd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_innd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_innd_server_packets'($*)) dnl
-
- gen_require(`
- type innd_server_packet_t;
- ')
-
- dontaudit $1 innd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_innd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive innd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_innd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_innd_server_packets'($*)) dnl
-
- gen_require(`
- type innd_server_packet_t;
- ')
-
- allow $1 innd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_innd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive innd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_innd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_innd_server_packets'($*)) dnl
-
- gen_require(`
- type innd_server_packet_t;
- ')
-
- dontaudit $1 innd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_innd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive innd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_innd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_innd_server_packets'($*)) dnl
-
- corenet_send_innd_server_packets($1)
- corenet_receive_innd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_innd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive innd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_innd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_innd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_innd_server_packets($1)
- corenet_dontaudit_receive_innd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_innd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to innd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_innd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_innd_server_packets'($*)) dnl
-
- gen_require(`
- type innd_server_packet_t;
- ')
-
- allow $1 innd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_innd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the interwise port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_interwise_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_interwise_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_interwise_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the interwise port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_interwise_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_interwise_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_interwise_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the interwise port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_interwise_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_interwise_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_interwise_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the interwise port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_interwise_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_interwise_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_interwise_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the interwise port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_interwise_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_interwise_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_interwise_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the interwise port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_interwise_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_interwise_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_interwise_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the interwise port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_interwise_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_interwise_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_interwise_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the interwise port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_interwise_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_interwise_port'($*)) dnl
-
- gen_require(`
- type interwise_port_t;
- ')
-
- allow $1 interwise_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_interwise_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the interwise port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_interwise_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_interwise_port'($*)) dnl
-
- gen_require(`
- type interwise_port_t;
- ')
-
- allow $1 interwise_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_interwise_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the interwise port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_interwise_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_interwise_port'($*)) dnl
-
- gen_require(`
- type interwise_port_t;
- ')
-
- allow $1 interwise_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_interwise_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send interwise_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_interwise_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_interwise_client_packets'($*)) dnl
-
- gen_require(`
- type interwise_client_packet_t;
- ')
-
- allow $1 interwise_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_interwise_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send interwise_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_interwise_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_interwise_client_packets'($*)) dnl
-
- gen_require(`
- type interwise_client_packet_t;
- ')
-
- dontaudit $1 interwise_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_interwise_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive interwise_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_interwise_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_interwise_client_packets'($*)) dnl
-
- gen_require(`
- type interwise_client_packet_t;
- ')
-
- allow $1 interwise_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_interwise_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive interwise_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_interwise_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_interwise_client_packets'($*)) dnl
-
- gen_require(`
- type interwise_client_packet_t;
- ')
-
- dontaudit $1 interwise_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_interwise_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive interwise_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_interwise_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_interwise_client_packets'($*)) dnl
-
- corenet_send_interwise_client_packets($1)
- corenet_receive_interwise_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_interwise_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive interwise_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_interwise_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_interwise_client_packets'($*)) dnl
-
- corenet_dontaudit_send_interwise_client_packets($1)
- corenet_dontaudit_receive_interwise_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_interwise_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to interwise_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_interwise_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_interwise_client_packets'($*)) dnl
-
- gen_require(`
- type interwise_client_packet_t;
- ')
-
- allow $1 interwise_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_interwise_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send interwise_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_interwise_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_interwise_server_packets'($*)) dnl
-
- gen_require(`
- type interwise_server_packet_t;
- ')
-
- allow $1 interwise_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_interwise_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send interwise_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_interwise_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_interwise_server_packets'($*)) dnl
-
- gen_require(`
- type interwise_server_packet_t;
- ')
-
- dontaudit $1 interwise_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_interwise_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive interwise_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_interwise_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_interwise_server_packets'($*)) dnl
-
- gen_require(`
- type interwise_server_packet_t;
- ')
-
- allow $1 interwise_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_interwise_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive interwise_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_interwise_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_interwise_server_packets'($*)) dnl
-
- gen_require(`
- type interwise_server_packet_t;
- ')
-
- dontaudit $1 interwise_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_interwise_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive interwise_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_interwise_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_interwise_server_packets'($*)) dnl
-
- corenet_send_interwise_server_packets($1)
- corenet_receive_interwise_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_interwise_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive interwise_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_interwise_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_interwise_server_packets'($*)) dnl
-
- corenet_dontaudit_send_interwise_server_packets($1)
- corenet_dontaudit_receive_interwise_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_interwise_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to interwise_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_interwise_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_interwise_server_packets'($*)) dnl
-
- gen_require(`
- type interwise_server_packet_t;
- ')
-
- allow $1 interwise_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_interwise_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the ionixnetmon port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_ionixnetmon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ionixnetmon_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ionixnetmon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the ionixnetmon port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_ionixnetmon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ionixnetmon_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_ionixnetmon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the ionixnetmon port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_ionixnetmon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ionixnetmon_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ionixnetmon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the ionixnetmon port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_ionixnetmon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ionixnetmon_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ionixnetmon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the ionixnetmon port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_ionixnetmon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ionixnetmon_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ionixnetmon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the ionixnetmon port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_ionixnetmon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ionixnetmon_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ionixnetmon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the ionixnetmon port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_ionixnetmon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ionixnetmon_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ionixnetmon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the ionixnetmon port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_ionixnetmon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ionixnetmon_port'($*)) dnl
-
- gen_require(`
- type ionixnetmon_port_t;
- ')
-
- allow $1 ionixnetmon_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ionixnetmon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the ionixnetmon port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_ionixnetmon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ionixnetmon_port'($*)) dnl
-
- gen_require(`
- type ionixnetmon_port_t;
- ')
-
- allow $1 ionixnetmon_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ionixnetmon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the ionixnetmon port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_ionixnetmon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ionixnetmon_port'($*)) dnl
-
- gen_require(`
- type ionixnetmon_port_t;
- ')
-
- allow $1 ionixnetmon_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ionixnetmon_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ionixnetmon_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ionixnetmon_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ionixnetmon_client_packets'($*)) dnl
-
- gen_require(`
- type ionixnetmon_client_packet_t;
- ')
-
- allow $1 ionixnetmon_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ionixnetmon_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ionixnetmon_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ionixnetmon_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ionixnetmon_client_packets'($*)) dnl
-
- gen_require(`
- type ionixnetmon_client_packet_t;
- ')
-
- dontaudit $1 ionixnetmon_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ionixnetmon_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ionixnetmon_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ionixnetmon_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ionixnetmon_client_packets'($*)) dnl
-
- gen_require(`
- type ionixnetmon_client_packet_t;
- ')
-
- allow $1 ionixnetmon_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ionixnetmon_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ionixnetmon_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ionixnetmon_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ionixnetmon_client_packets'($*)) dnl
-
- gen_require(`
- type ionixnetmon_client_packet_t;
- ')
-
- dontaudit $1 ionixnetmon_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ionixnetmon_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ionixnetmon_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ionixnetmon_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ionixnetmon_client_packets'($*)) dnl
-
- corenet_send_ionixnetmon_client_packets($1)
- corenet_receive_ionixnetmon_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ionixnetmon_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ionixnetmon_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ionixnetmon_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ionixnetmon_client_packets'($*)) dnl
-
- corenet_dontaudit_send_ionixnetmon_client_packets($1)
- corenet_dontaudit_receive_ionixnetmon_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ionixnetmon_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ionixnetmon_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ionixnetmon_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ionixnetmon_client_packets'($*)) dnl
-
- gen_require(`
- type ionixnetmon_client_packet_t;
- ')
-
- allow $1 ionixnetmon_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ionixnetmon_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ionixnetmon_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ionixnetmon_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ionixnetmon_server_packets'($*)) dnl
-
- gen_require(`
- type ionixnetmon_server_packet_t;
- ')
-
- allow $1 ionixnetmon_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ionixnetmon_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ionixnetmon_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ionixnetmon_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ionixnetmon_server_packets'($*)) dnl
-
- gen_require(`
- type ionixnetmon_server_packet_t;
- ')
-
- dontaudit $1 ionixnetmon_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ionixnetmon_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ionixnetmon_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ionixnetmon_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ionixnetmon_server_packets'($*)) dnl
-
- gen_require(`
- type ionixnetmon_server_packet_t;
- ')
-
- allow $1 ionixnetmon_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ionixnetmon_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ionixnetmon_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ionixnetmon_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ionixnetmon_server_packets'($*)) dnl
-
- gen_require(`
- type ionixnetmon_server_packet_t;
- ')
-
- dontaudit $1 ionixnetmon_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ionixnetmon_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ionixnetmon_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ionixnetmon_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ionixnetmon_server_packets'($*)) dnl
-
- corenet_send_ionixnetmon_server_packets($1)
- corenet_receive_ionixnetmon_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ionixnetmon_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ionixnetmon_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ionixnetmon_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ionixnetmon_server_packets'($*)) dnl
-
- corenet_dontaudit_send_ionixnetmon_server_packets($1)
- corenet_dontaudit_receive_ionixnetmon_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ionixnetmon_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ionixnetmon_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ionixnetmon_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ionixnetmon_server_packets'($*)) dnl
-
- gen_require(`
- type ionixnetmon_server_packet_t;
- ')
-
- allow $1 ionixnetmon_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ionixnetmon_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the ipmi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_ipmi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ipmi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ipmi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the ipmi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_ipmi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ipmi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_ipmi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the ipmi port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_ipmi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ipmi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ipmi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the ipmi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_ipmi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ipmi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ipmi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the ipmi port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_ipmi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ipmi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ipmi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the ipmi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_ipmi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ipmi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ipmi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the ipmi port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_ipmi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ipmi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ipmi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the ipmi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_ipmi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ipmi_port'($*)) dnl
-
- gen_require(`
- type ipmi_port_t;
- ')
-
- allow $1 ipmi_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ipmi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the ipmi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_ipmi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ipmi_port'($*)) dnl
-
- gen_require(`
- type ipmi_port_t;
- ')
-
- allow $1 ipmi_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ipmi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the ipmi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_ipmi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ipmi_port'($*)) dnl
-
- gen_require(`
- type ipmi_port_t;
- ')
-
- allow $1 ipmi_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ipmi_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ipmi_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ipmi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ipmi_client_packets'($*)) dnl
-
- gen_require(`
- type ipmi_client_packet_t;
- ')
-
- allow $1 ipmi_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ipmi_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ipmi_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ipmi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ipmi_client_packets'($*)) dnl
-
- gen_require(`
- type ipmi_client_packet_t;
- ')
-
- dontaudit $1 ipmi_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ipmi_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ipmi_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ipmi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ipmi_client_packets'($*)) dnl
-
- gen_require(`
- type ipmi_client_packet_t;
- ')
-
- allow $1 ipmi_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ipmi_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ipmi_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ipmi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ipmi_client_packets'($*)) dnl
-
- gen_require(`
- type ipmi_client_packet_t;
- ')
-
- dontaudit $1 ipmi_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ipmi_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ipmi_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ipmi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ipmi_client_packets'($*)) dnl
-
- corenet_send_ipmi_client_packets($1)
- corenet_receive_ipmi_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ipmi_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ipmi_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ipmi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ipmi_client_packets'($*)) dnl
-
- corenet_dontaudit_send_ipmi_client_packets($1)
- corenet_dontaudit_receive_ipmi_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ipmi_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ipmi_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ipmi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ipmi_client_packets'($*)) dnl
-
- gen_require(`
- type ipmi_client_packet_t;
- ')
-
- allow $1 ipmi_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ipmi_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ipmi_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ipmi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ipmi_server_packets'($*)) dnl
-
- gen_require(`
- type ipmi_server_packet_t;
- ')
-
- allow $1 ipmi_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ipmi_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ipmi_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ipmi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ipmi_server_packets'($*)) dnl
-
- gen_require(`
- type ipmi_server_packet_t;
- ')
-
- dontaudit $1 ipmi_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ipmi_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ipmi_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ipmi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ipmi_server_packets'($*)) dnl
-
- gen_require(`
- type ipmi_server_packet_t;
- ')
-
- allow $1 ipmi_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ipmi_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ipmi_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ipmi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ipmi_server_packets'($*)) dnl
-
- gen_require(`
- type ipmi_server_packet_t;
- ')
-
- dontaudit $1 ipmi_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ipmi_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ipmi_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ipmi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ipmi_server_packets'($*)) dnl
-
- corenet_send_ipmi_server_packets($1)
- corenet_receive_ipmi_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ipmi_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ipmi_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ipmi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ipmi_server_packets'($*)) dnl
-
- corenet_dontaudit_send_ipmi_server_packets($1)
- corenet_dontaudit_receive_ipmi_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ipmi_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ipmi_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ipmi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ipmi_server_packets'($*)) dnl
-
- gen_require(`
- type ipmi_server_packet_t;
- ')
-
- allow $1 ipmi_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ipmi_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the ipp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_ipp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ipp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ipp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the ipp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_ipp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ipp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_ipp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the ipp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_ipp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ipp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ipp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the ipp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_ipp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ipp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ipp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the ipp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_ipp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ipp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ipp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the ipp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_ipp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ipp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ipp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the ipp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_ipp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ipp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ipp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the ipp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_ipp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ipp_port'($*)) dnl
-
- gen_require(`
- type ipp_port_t;
- ')
-
- allow $1 ipp_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ipp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the ipp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_ipp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ipp_port'($*)) dnl
-
- gen_require(`
- type ipp_port_t;
- ')
-
- allow $1 ipp_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ipp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the ipp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_ipp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ipp_port'($*)) dnl
-
- gen_require(`
- type ipp_port_t;
- ')
-
- allow $1 ipp_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ipp_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ipp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ipp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ipp_client_packets'($*)) dnl
-
- gen_require(`
- type ipp_client_packet_t;
- ')
-
- allow $1 ipp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ipp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ipp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ipp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ipp_client_packets'($*)) dnl
-
- gen_require(`
- type ipp_client_packet_t;
- ')
-
- dontaudit $1 ipp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ipp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ipp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ipp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ipp_client_packets'($*)) dnl
-
- gen_require(`
- type ipp_client_packet_t;
- ')
-
- allow $1 ipp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ipp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ipp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ipp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ipp_client_packets'($*)) dnl
-
- gen_require(`
- type ipp_client_packet_t;
- ')
-
- dontaudit $1 ipp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ipp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ipp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ipp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ipp_client_packets'($*)) dnl
-
- corenet_send_ipp_client_packets($1)
- corenet_receive_ipp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ipp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ipp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ipp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ipp_client_packets'($*)) dnl
-
- corenet_dontaudit_send_ipp_client_packets($1)
- corenet_dontaudit_receive_ipp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ipp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ipp_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ipp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ipp_client_packets'($*)) dnl
-
- gen_require(`
- type ipp_client_packet_t;
- ')
-
- allow $1 ipp_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ipp_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ipp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ipp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ipp_server_packets'($*)) dnl
-
- gen_require(`
- type ipp_server_packet_t;
- ')
-
- allow $1 ipp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ipp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ipp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ipp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ipp_server_packets'($*)) dnl
-
- gen_require(`
- type ipp_server_packet_t;
- ')
-
- dontaudit $1 ipp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ipp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ipp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ipp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ipp_server_packets'($*)) dnl
-
- gen_require(`
- type ipp_server_packet_t;
- ')
-
- allow $1 ipp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ipp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ipp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ipp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ipp_server_packets'($*)) dnl
-
- gen_require(`
- type ipp_server_packet_t;
- ')
-
- dontaudit $1 ipp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ipp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ipp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ipp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ipp_server_packets'($*)) dnl
-
- corenet_send_ipp_server_packets($1)
- corenet_receive_ipp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ipp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ipp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ipp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ipp_server_packets'($*)) dnl
-
- corenet_dontaudit_send_ipp_server_packets($1)
- corenet_dontaudit_receive_ipp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ipp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ipp_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ipp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ipp_server_packets'($*)) dnl
-
- gen_require(`
- type ipp_server_packet_t;
- ')
-
- allow $1 ipp_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ipp_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the ipsecnat port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_ipsecnat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ipsecnat_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ipsecnat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the ipsecnat port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_ipsecnat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ipsecnat_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_ipsecnat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the ipsecnat port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_ipsecnat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ipsecnat_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ipsecnat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the ipsecnat port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_ipsecnat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ipsecnat_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ipsecnat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the ipsecnat port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_ipsecnat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ipsecnat_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ipsecnat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the ipsecnat port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_ipsecnat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ipsecnat_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ipsecnat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the ipsecnat port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_ipsecnat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ipsecnat_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ipsecnat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the ipsecnat port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_ipsecnat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ipsecnat_port'($*)) dnl
-
- gen_require(`
- type ipsecnat_port_t;
- ')
-
- allow $1 ipsecnat_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ipsecnat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the ipsecnat port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_ipsecnat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ipsecnat_port'($*)) dnl
-
- gen_require(`
- type ipsecnat_port_t;
- ')
-
- allow $1 ipsecnat_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ipsecnat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the ipsecnat port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_ipsecnat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ipsecnat_port'($*)) dnl
-
- gen_require(`
- type ipsecnat_port_t;
- ')
-
- allow $1 ipsecnat_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ipsecnat_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ipsecnat_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ipsecnat_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ipsecnat_client_packets'($*)) dnl
-
- gen_require(`
- type ipsecnat_client_packet_t;
- ')
-
- allow $1 ipsecnat_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ipsecnat_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ipsecnat_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ipsecnat_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ipsecnat_client_packets'($*)) dnl
-
- gen_require(`
- type ipsecnat_client_packet_t;
- ')
-
- dontaudit $1 ipsecnat_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ipsecnat_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ipsecnat_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ipsecnat_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ipsecnat_client_packets'($*)) dnl
-
- gen_require(`
- type ipsecnat_client_packet_t;
- ')
-
- allow $1 ipsecnat_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ipsecnat_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ipsecnat_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ipsecnat_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ipsecnat_client_packets'($*)) dnl
-
- gen_require(`
- type ipsecnat_client_packet_t;
- ')
-
- dontaudit $1 ipsecnat_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ipsecnat_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ipsecnat_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ipsecnat_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ipsecnat_client_packets'($*)) dnl
-
- corenet_send_ipsecnat_client_packets($1)
- corenet_receive_ipsecnat_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ipsecnat_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ipsecnat_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ipsecnat_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ipsecnat_client_packets'($*)) dnl
-
- corenet_dontaudit_send_ipsecnat_client_packets($1)
- corenet_dontaudit_receive_ipsecnat_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ipsecnat_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ipsecnat_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ipsecnat_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ipsecnat_client_packets'($*)) dnl
-
- gen_require(`
- type ipsecnat_client_packet_t;
- ')
-
- allow $1 ipsecnat_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ipsecnat_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ipsecnat_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ipsecnat_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ipsecnat_server_packets'($*)) dnl
-
- gen_require(`
- type ipsecnat_server_packet_t;
- ')
-
- allow $1 ipsecnat_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ipsecnat_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ipsecnat_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ipsecnat_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ipsecnat_server_packets'($*)) dnl
-
- gen_require(`
- type ipsecnat_server_packet_t;
- ')
-
- dontaudit $1 ipsecnat_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ipsecnat_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ipsecnat_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ipsecnat_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ipsecnat_server_packets'($*)) dnl
-
- gen_require(`
- type ipsecnat_server_packet_t;
- ')
-
- allow $1 ipsecnat_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ipsecnat_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ipsecnat_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ipsecnat_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ipsecnat_server_packets'($*)) dnl
-
- gen_require(`
- type ipsecnat_server_packet_t;
- ')
-
- dontaudit $1 ipsecnat_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ipsecnat_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ipsecnat_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ipsecnat_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ipsecnat_server_packets'($*)) dnl
-
- corenet_send_ipsecnat_server_packets($1)
- corenet_receive_ipsecnat_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ipsecnat_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ipsecnat_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ipsecnat_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ipsecnat_server_packets'($*)) dnl
-
- corenet_dontaudit_send_ipsecnat_server_packets($1)
- corenet_dontaudit_receive_ipsecnat_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ipsecnat_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ipsecnat_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ipsecnat_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ipsecnat_server_packets'($*)) dnl
-
- gen_require(`
- type ipsecnat_server_packet_t;
- ')
-
- allow $1 ipsecnat_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ipsecnat_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the ircd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_ircd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ircd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ircd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the ircd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_ircd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ircd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_ircd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the ircd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_ircd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ircd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ircd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the ircd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_ircd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ircd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ircd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the ircd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_ircd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ircd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ircd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the ircd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_ircd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ircd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ircd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the ircd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_ircd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ircd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ircd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the ircd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_ircd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ircd_port'($*)) dnl
-
- gen_require(`
- type ircd_port_t;
- ')
-
- allow $1 ircd_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ircd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the ircd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_ircd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ircd_port'($*)) dnl
-
- gen_require(`
- type ircd_port_t;
- ')
-
- allow $1 ircd_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ircd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the ircd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_ircd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ircd_port'($*)) dnl
-
- gen_require(`
- type ircd_port_t;
- ')
-
- allow $1 ircd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ircd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ircd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ircd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ircd_client_packets'($*)) dnl
-
- gen_require(`
- type ircd_client_packet_t;
- ')
-
- allow $1 ircd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ircd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ircd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ircd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ircd_client_packets'($*)) dnl
-
- gen_require(`
- type ircd_client_packet_t;
- ')
-
- dontaudit $1 ircd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ircd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ircd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ircd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ircd_client_packets'($*)) dnl
-
- gen_require(`
- type ircd_client_packet_t;
- ')
-
- allow $1 ircd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ircd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ircd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ircd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ircd_client_packets'($*)) dnl
-
- gen_require(`
- type ircd_client_packet_t;
- ')
-
- dontaudit $1 ircd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ircd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ircd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ircd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ircd_client_packets'($*)) dnl
-
- corenet_send_ircd_client_packets($1)
- corenet_receive_ircd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ircd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ircd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ircd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ircd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_ircd_client_packets($1)
- corenet_dontaudit_receive_ircd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ircd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ircd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ircd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ircd_client_packets'($*)) dnl
-
- gen_require(`
- type ircd_client_packet_t;
- ')
-
- allow $1 ircd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ircd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ircd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ircd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ircd_server_packets'($*)) dnl
-
- gen_require(`
- type ircd_server_packet_t;
- ')
-
- allow $1 ircd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ircd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ircd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ircd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ircd_server_packets'($*)) dnl
-
- gen_require(`
- type ircd_server_packet_t;
- ')
-
- dontaudit $1 ircd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ircd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ircd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ircd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ircd_server_packets'($*)) dnl
-
- gen_require(`
- type ircd_server_packet_t;
- ')
-
- allow $1 ircd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ircd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ircd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ircd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ircd_server_packets'($*)) dnl
-
- gen_require(`
- type ircd_server_packet_t;
- ')
-
- dontaudit $1 ircd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ircd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ircd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ircd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ircd_server_packets'($*)) dnl
-
- corenet_send_ircd_server_packets($1)
- corenet_receive_ircd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ircd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ircd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ircd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ircd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_ircd_server_packets($1)
- corenet_dontaudit_receive_ircd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ircd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ircd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ircd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ircd_server_packets'($*)) dnl
-
- gen_require(`
- type ircd_server_packet_t;
- ')
-
- allow $1 ircd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ircd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the isakmp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_isakmp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_isakmp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_isakmp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the isakmp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_isakmp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_isakmp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_isakmp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the isakmp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_isakmp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_isakmp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_isakmp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the isakmp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_isakmp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_isakmp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_isakmp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the isakmp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_isakmp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_isakmp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_isakmp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the isakmp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_isakmp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_isakmp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_isakmp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the isakmp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_isakmp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_isakmp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_isakmp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the isakmp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_isakmp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_isakmp_port'($*)) dnl
-
- gen_require(`
- type isakmp_port_t;
- ')
-
- allow $1 isakmp_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_isakmp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the isakmp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_isakmp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_isakmp_port'($*)) dnl
-
- gen_require(`
- type isakmp_port_t;
- ')
-
- allow $1 isakmp_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_isakmp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the isakmp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_isakmp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_isakmp_port'($*)) dnl
-
- gen_require(`
- type isakmp_port_t;
- ')
-
- allow $1 isakmp_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_isakmp_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send isakmp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_isakmp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_isakmp_client_packets'($*)) dnl
-
- gen_require(`
- type isakmp_client_packet_t;
- ')
-
- allow $1 isakmp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_isakmp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send isakmp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_isakmp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_isakmp_client_packets'($*)) dnl
-
- gen_require(`
- type isakmp_client_packet_t;
- ')
-
- dontaudit $1 isakmp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_isakmp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive isakmp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_isakmp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_isakmp_client_packets'($*)) dnl
-
- gen_require(`
- type isakmp_client_packet_t;
- ')
-
- allow $1 isakmp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_isakmp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive isakmp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_isakmp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_isakmp_client_packets'($*)) dnl
-
- gen_require(`
- type isakmp_client_packet_t;
- ')
-
- dontaudit $1 isakmp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_isakmp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive isakmp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_isakmp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_isakmp_client_packets'($*)) dnl
-
- corenet_send_isakmp_client_packets($1)
- corenet_receive_isakmp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_isakmp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive isakmp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_isakmp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_isakmp_client_packets'($*)) dnl
-
- corenet_dontaudit_send_isakmp_client_packets($1)
- corenet_dontaudit_receive_isakmp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_isakmp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to isakmp_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_isakmp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_isakmp_client_packets'($*)) dnl
-
- gen_require(`
- type isakmp_client_packet_t;
- ')
-
- allow $1 isakmp_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_isakmp_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send isakmp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_isakmp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_isakmp_server_packets'($*)) dnl
-
- gen_require(`
- type isakmp_server_packet_t;
- ')
-
- allow $1 isakmp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_isakmp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send isakmp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_isakmp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_isakmp_server_packets'($*)) dnl
-
- gen_require(`
- type isakmp_server_packet_t;
- ')
-
- dontaudit $1 isakmp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_isakmp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive isakmp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_isakmp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_isakmp_server_packets'($*)) dnl
-
- gen_require(`
- type isakmp_server_packet_t;
- ')
-
- allow $1 isakmp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_isakmp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive isakmp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_isakmp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_isakmp_server_packets'($*)) dnl
-
- gen_require(`
- type isakmp_server_packet_t;
- ')
-
- dontaudit $1 isakmp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_isakmp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive isakmp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_isakmp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_isakmp_server_packets'($*)) dnl
-
- corenet_send_isakmp_server_packets($1)
- corenet_receive_isakmp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_isakmp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive isakmp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_isakmp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_isakmp_server_packets'($*)) dnl
-
- corenet_dontaudit_send_isakmp_server_packets($1)
- corenet_dontaudit_receive_isakmp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_isakmp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to isakmp_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_isakmp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_isakmp_server_packets'($*)) dnl
-
- gen_require(`
- type isakmp_server_packet_t;
- ')
-
- allow $1 isakmp_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_isakmp_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the iscsi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_iscsi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_iscsi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_iscsi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the iscsi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_iscsi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_iscsi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_iscsi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the iscsi port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_iscsi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_iscsi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_iscsi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the iscsi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_iscsi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_iscsi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_iscsi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the iscsi port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_iscsi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_iscsi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_iscsi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the iscsi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_iscsi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_iscsi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_iscsi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the iscsi port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_iscsi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_iscsi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_iscsi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the iscsi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_iscsi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_iscsi_port'($*)) dnl
-
- gen_require(`
- type iscsi_port_t;
- ')
-
- allow $1 iscsi_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_iscsi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the iscsi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_iscsi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_iscsi_port'($*)) dnl
-
- gen_require(`
- type iscsi_port_t;
- ')
-
- allow $1 iscsi_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_iscsi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the iscsi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_iscsi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_iscsi_port'($*)) dnl
-
- gen_require(`
- type iscsi_port_t;
- ')
-
- allow $1 iscsi_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_iscsi_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send iscsi_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_iscsi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_iscsi_client_packets'($*)) dnl
-
- gen_require(`
- type iscsi_client_packet_t;
- ')
-
- allow $1 iscsi_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_iscsi_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send iscsi_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_iscsi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_iscsi_client_packets'($*)) dnl
-
- gen_require(`
- type iscsi_client_packet_t;
- ')
-
- dontaudit $1 iscsi_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_iscsi_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive iscsi_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_iscsi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_iscsi_client_packets'($*)) dnl
-
- gen_require(`
- type iscsi_client_packet_t;
- ')
-
- allow $1 iscsi_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_iscsi_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive iscsi_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_iscsi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_iscsi_client_packets'($*)) dnl
-
- gen_require(`
- type iscsi_client_packet_t;
- ')
-
- dontaudit $1 iscsi_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_iscsi_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive iscsi_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_iscsi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_iscsi_client_packets'($*)) dnl
-
- corenet_send_iscsi_client_packets($1)
- corenet_receive_iscsi_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_iscsi_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive iscsi_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_iscsi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_iscsi_client_packets'($*)) dnl
-
- corenet_dontaudit_send_iscsi_client_packets($1)
- corenet_dontaudit_receive_iscsi_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_iscsi_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to iscsi_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_iscsi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_iscsi_client_packets'($*)) dnl
-
- gen_require(`
- type iscsi_client_packet_t;
- ')
-
- allow $1 iscsi_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_iscsi_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send iscsi_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_iscsi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_iscsi_server_packets'($*)) dnl
-
- gen_require(`
- type iscsi_server_packet_t;
- ')
-
- allow $1 iscsi_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_iscsi_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send iscsi_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_iscsi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_iscsi_server_packets'($*)) dnl
-
- gen_require(`
- type iscsi_server_packet_t;
- ')
-
- dontaudit $1 iscsi_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_iscsi_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive iscsi_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_iscsi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_iscsi_server_packets'($*)) dnl
-
- gen_require(`
- type iscsi_server_packet_t;
- ')
-
- allow $1 iscsi_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_iscsi_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive iscsi_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_iscsi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_iscsi_server_packets'($*)) dnl
-
- gen_require(`
- type iscsi_server_packet_t;
- ')
-
- dontaudit $1 iscsi_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_iscsi_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive iscsi_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_iscsi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_iscsi_server_packets'($*)) dnl
-
- corenet_send_iscsi_server_packets($1)
- corenet_receive_iscsi_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_iscsi_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive iscsi_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_iscsi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_iscsi_server_packets'($*)) dnl
-
- corenet_dontaudit_send_iscsi_server_packets($1)
- corenet_dontaudit_receive_iscsi_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_iscsi_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to iscsi_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_iscsi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_iscsi_server_packets'($*)) dnl
-
- gen_require(`
- type iscsi_server_packet_t;
- ')
-
- allow $1 iscsi_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_iscsi_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the isns port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_isns_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_isns_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_isns_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the isns port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_isns_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_isns_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_isns_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the isns port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_isns_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_isns_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_isns_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the isns port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_isns_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_isns_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_isns_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the isns port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_isns_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_isns_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_isns_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the isns port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_isns_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_isns_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_isns_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the isns port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_isns_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_isns_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_isns_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the isns port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_isns_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_isns_port'($*)) dnl
-
- gen_require(`
- type isns_port_t;
- ')
-
- allow $1 isns_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_isns_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the isns port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_isns_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_isns_port'($*)) dnl
-
- gen_require(`
- type isns_port_t;
- ')
-
- allow $1 isns_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_isns_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the isns port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_isns_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_isns_port'($*)) dnl
-
- gen_require(`
- type isns_port_t;
- ')
-
- allow $1 isns_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_isns_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send isns_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_isns_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_isns_client_packets'($*)) dnl
-
- gen_require(`
- type isns_client_packet_t;
- ')
-
- allow $1 isns_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_isns_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send isns_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_isns_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_isns_client_packets'($*)) dnl
-
- gen_require(`
- type isns_client_packet_t;
- ')
-
- dontaudit $1 isns_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_isns_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive isns_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_isns_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_isns_client_packets'($*)) dnl
-
- gen_require(`
- type isns_client_packet_t;
- ')
-
- allow $1 isns_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_isns_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive isns_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_isns_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_isns_client_packets'($*)) dnl
-
- gen_require(`
- type isns_client_packet_t;
- ')
-
- dontaudit $1 isns_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_isns_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive isns_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_isns_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_isns_client_packets'($*)) dnl
-
- corenet_send_isns_client_packets($1)
- corenet_receive_isns_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_isns_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive isns_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_isns_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_isns_client_packets'($*)) dnl
-
- corenet_dontaudit_send_isns_client_packets($1)
- corenet_dontaudit_receive_isns_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_isns_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to isns_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_isns_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_isns_client_packets'($*)) dnl
-
- gen_require(`
- type isns_client_packet_t;
- ')
-
- allow $1 isns_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_isns_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send isns_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_isns_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_isns_server_packets'($*)) dnl
-
- gen_require(`
- type isns_server_packet_t;
- ')
-
- allow $1 isns_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_isns_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send isns_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_isns_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_isns_server_packets'($*)) dnl
-
- gen_require(`
- type isns_server_packet_t;
- ')
-
- dontaudit $1 isns_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_isns_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive isns_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_isns_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_isns_server_packets'($*)) dnl
-
- gen_require(`
- type isns_server_packet_t;
- ')
-
- allow $1 isns_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_isns_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive isns_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_isns_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_isns_server_packets'($*)) dnl
-
- gen_require(`
- type isns_server_packet_t;
- ')
-
- dontaudit $1 isns_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_isns_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive isns_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_isns_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_isns_server_packets'($*)) dnl
-
- corenet_send_isns_server_packets($1)
- corenet_receive_isns_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_isns_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive isns_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_isns_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_isns_server_packets'($*)) dnl
-
- corenet_dontaudit_send_isns_server_packets($1)
- corenet_dontaudit_receive_isns_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_isns_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to isns_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_isns_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_isns_server_packets'($*)) dnl
-
- gen_require(`
- type isns_server_packet_t;
- ')
-
- allow $1 isns_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_isns_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the jabber_client port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_jabber_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_jabber_client_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_jabber_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the jabber_client port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_jabber_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_jabber_client_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_jabber_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the jabber_client port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_jabber_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_jabber_client_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_jabber_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the jabber_client port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_jabber_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_jabber_client_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_jabber_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the jabber_client port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_jabber_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_jabber_client_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_jabber_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the jabber_client port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_jabber_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_jabber_client_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_jabber_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the jabber_client port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_jabber_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_jabber_client_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_jabber_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the jabber_client port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_jabber_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_jabber_client_port'($*)) dnl
-
- gen_require(`
- type jabber_client_port_t;
- ')
-
- allow $1 jabber_client_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_jabber_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the jabber_client port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_jabber_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_jabber_client_port'($*)) dnl
-
- gen_require(`
- type jabber_client_port_t;
- ')
-
- allow $1 jabber_client_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_jabber_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the jabber_client port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_jabber_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_jabber_client_port'($*)) dnl
-
- gen_require(`
- type jabber_client_port_t;
- ')
-
- allow $1 jabber_client_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_jabber_client_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send jabber_client_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_jabber_client_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_jabber_client_client_packets'($*)) dnl
-
- gen_require(`
- type jabber_client_client_packet_t;
- ')
-
- allow $1 jabber_client_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_jabber_client_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send jabber_client_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_jabber_client_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_jabber_client_client_packets'($*)) dnl
-
- gen_require(`
- type jabber_client_client_packet_t;
- ')
-
- dontaudit $1 jabber_client_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_jabber_client_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive jabber_client_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_jabber_client_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_jabber_client_client_packets'($*)) dnl
-
- gen_require(`
- type jabber_client_client_packet_t;
- ')
-
- allow $1 jabber_client_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_jabber_client_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive jabber_client_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_jabber_client_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_jabber_client_client_packets'($*)) dnl
-
- gen_require(`
- type jabber_client_client_packet_t;
- ')
-
- dontaudit $1 jabber_client_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_jabber_client_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive jabber_client_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_jabber_client_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_jabber_client_client_packets'($*)) dnl
-
- corenet_send_jabber_client_client_packets($1)
- corenet_receive_jabber_client_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_jabber_client_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive jabber_client_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_jabber_client_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_jabber_client_client_packets'($*)) dnl
-
- corenet_dontaudit_send_jabber_client_client_packets($1)
- corenet_dontaudit_receive_jabber_client_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_jabber_client_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to jabber_client_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_jabber_client_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_jabber_client_client_packets'($*)) dnl
-
- gen_require(`
- type jabber_client_client_packet_t;
- ')
-
- allow $1 jabber_client_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_jabber_client_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send jabber_client_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_jabber_client_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_jabber_client_server_packets'($*)) dnl
-
- gen_require(`
- type jabber_client_server_packet_t;
- ')
-
- allow $1 jabber_client_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_jabber_client_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send jabber_client_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_jabber_client_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_jabber_client_server_packets'($*)) dnl
-
- gen_require(`
- type jabber_client_server_packet_t;
- ')
-
- dontaudit $1 jabber_client_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_jabber_client_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive jabber_client_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_jabber_client_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_jabber_client_server_packets'($*)) dnl
-
- gen_require(`
- type jabber_client_server_packet_t;
- ')
-
- allow $1 jabber_client_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_jabber_client_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive jabber_client_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_jabber_client_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_jabber_client_server_packets'($*)) dnl
-
- gen_require(`
- type jabber_client_server_packet_t;
- ')
-
- dontaudit $1 jabber_client_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_jabber_client_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive jabber_client_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_jabber_client_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_jabber_client_server_packets'($*)) dnl
-
- corenet_send_jabber_client_server_packets($1)
- corenet_receive_jabber_client_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_jabber_client_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive jabber_client_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_jabber_client_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_jabber_client_server_packets'($*)) dnl
-
- corenet_dontaudit_send_jabber_client_server_packets($1)
- corenet_dontaudit_receive_jabber_client_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_jabber_client_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to jabber_client_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_jabber_client_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_jabber_client_server_packets'($*)) dnl
-
- gen_require(`
- type jabber_client_server_packet_t;
- ')
-
- allow $1 jabber_client_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_jabber_client_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the jabber_interserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_jabber_interserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_jabber_interserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_jabber_interserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the jabber_interserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_jabber_interserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_jabber_interserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_jabber_interserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the jabber_interserver port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_jabber_interserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_jabber_interserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_jabber_interserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the jabber_interserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_jabber_interserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_jabber_interserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_jabber_interserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the jabber_interserver port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_jabber_interserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_jabber_interserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_jabber_interserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the jabber_interserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_jabber_interserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_jabber_interserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_jabber_interserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the jabber_interserver port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_jabber_interserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_jabber_interserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_jabber_interserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the jabber_interserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_jabber_interserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_jabber_interserver_port'($*)) dnl
-
- gen_require(`
- type jabber_interserver_port_t;
- ')
-
- allow $1 jabber_interserver_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_jabber_interserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the jabber_interserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_jabber_interserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_jabber_interserver_port'($*)) dnl
-
- gen_require(`
- type jabber_interserver_port_t;
- ')
-
- allow $1 jabber_interserver_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_jabber_interserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the jabber_interserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_jabber_interserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_jabber_interserver_port'($*)) dnl
-
- gen_require(`
- type jabber_interserver_port_t;
- ')
-
- allow $1 jabber_interserver_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_jabber_interserver_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send jabber_interserver_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_jabber_interserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_jabber_interserver_client_packets'($*)) dnl
-
- gen_require(`
- type jabber_interserver_client_packet_t;
- ')
-
- allow $1 jabber_interserver_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_jabber_interserver_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send jabber_interserver_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_jabber_interserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_jabber_interserver_client_packets'($*)) dnl
-
- gen_require(`
- type jabber_interserver_client_packet_t;
- ')
-
- dontaudit $1 jabber_interserver_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_jabber_interserver_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive jabber_interserver_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_jabber_interserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_jabber_interserver_client_packets'($*)) dnl
-
- gen_require(`
- type jabber_interserver_client_packet_t;
- ')
-
- allow $1 jabber_interserver_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_jabber_interserver_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive jabber_interserver_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_jabber_interserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_jabber_interserver_client_packets'($*)) dnl
-
- gen_require(`
- type jabber_interserver_client_packet_t;
- ')
-
- dontaudit $1 jabber_interserver_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_jabber_interserver_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive jabber_interserver_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_jabber_interserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_jabber_interserver_client_packets'($*)) dnl
-
- corenet_send_jabber_interserver_client_packets($1)
- corenet_receive_jabber_interserver_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_jabber_interserver_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive jabber_interserver_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_jabber_interserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_jabber_interserver_client_packets'($*)) dnl
-
- corenet_dontaudit_send_jabber_interserver_client_packets($1)
- corenet_dontaudit_receive_jabber_interserver_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_jabber_interserver_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to jabber_interserver_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_jabber_interserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_jabber_interserver_client_packets'($*)) dnl
-
- gen_require(`
- type jabber_interserver_client_packet_t;
- ')
-
- allow $1 jabber_interserver_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_jabber_interserver_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send jabber_interserver_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_jabber_interserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_jabber_interserver_server_packets'($*)) dnl
-
- gen_require(`
- type jabber_interserver_server_packet_t;
- ')
-
- allow $1 jabber_interserver_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_jabber_interserver_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send jabber_interserver_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_jabber_interserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_jabber_interserver_server_packets'($*)) dnl
-
- gen_require(`
- type jabber_interserver_server_packet_t;
- ')
-
- dontaudit $1 jabber_interserver_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_jabber_interserver_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive jabber_interserver_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_jabber_interserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_jabber_interserver_server_packets'($*)) dnl
-
- gen_require(`
- type jabber_interserver_server_packet_t;
- ')
-
- allow $1 jabber_interserver_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_jabber_interserver_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive jabber_interserver_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_jabber_interserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_jabber_interserver_server_packets'($*)) dnl
-
- gen_require(`
- type jabber_interserver_server_packet_t;
- ')
-
- dontaudit $1 jabber_interserver_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_jabber_interserver_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive jabber_interserver_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_jabber_interserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_jabber_interserver_server_packets'($*)) dnl
-
- corenet_send_jabber_interserver_server_packets($1)
- corenet_receive_jabber_interserver_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_jabber_interserver_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive jabber_interserver_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_jabber_interserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_jabber_interserver_server_packets'($*)) dnl
-
- corenet_dontaudit_send_jabber_interserver_server_packets($1)
- corenet_dontaudit_receive_jabber_interserver_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_jabber_interserver_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to jabber_interserver_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_jabber_interserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_jabber_interserver_server_packets'($*)) dnl
-
- gen_require(`
- type jabber_interserver_server_packet_t;
- ')
-
- allow $1 jabber_interserver_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_jabber_interserver_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the jboss_iiop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_jboss_iiop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_jboss_iiop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_jboss_iiop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the jboss_iiop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_jboss_iiop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_jboss_iiop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_jboss_iiop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the jboss_iiop port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_jboss_iiop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_jboss_iiop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_jboss_iiop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the jboss_iiop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_jboss_iiop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_jboss_iiop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_jboss_iiop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the jboss_iiop port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_jboss_iiop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_jboss_iiop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_jboss_iiop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the jboss_iiop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_jboss_iiop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_jboss_iiop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_jboss_iiop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the jboss_iiop port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_jboss_iiop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_jboss_iiop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_jboss_iiop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the jboss_iiop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_jboss_iiop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_jboss_iiop_port'($*)) dnl
-
- gen_require(`
- type jboss_iiop_port_t;
- ')
-
- allow $1 jboss_iiop_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_jboss_iiop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the jboss_iiop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_jboss_iiop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_jboss_iiop_port'($*)) dnl
-
- gen_require(`
- type jboss_iiop_port_t;
- ')
-
- allow $1 jboss_iiop_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_jboss_iiop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the jboss_iiop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_jboss_iiop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_jboss_iiop_port'($*)) dnl
-
- gen_require(`
- type jboss_iiop_port_t;
- ')
-
- allow $1 jboss_iiop_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_jboss_iiop_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send jboss_iiop_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_jboss_iiop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_jboss_iiop_client_packets'($*)) dnl
-
- gen_require(`
- type jboss_iiop_client_packet_t;
- ')
-
- allow $1 jboss_iiop_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_jboss_iiop_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send jboss_iiop_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_jboss_iiop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_jboss_iiop_client_packets'($*)) dnl
-
- gen_require(`
- type jboss_iiop_client_packet_t;
- ')
-
- dontaudit $1 jboss_iiop_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_jboss_iiop_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive jboss_iiop_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_jboss_iiop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_jboss_iiop_client_packets'($*)) dnl
-
- gen_require(`
- type jboss_iiop_client_packet_t;
- ')
-
- allow $1 jboss_iiop_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_jboss_iiop_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive jboss_iiop_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_jboss_iiop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_jboss_iiop_client_packets'($*)) dnl
-
- gen_require(`
- type jboss_iiop_client_packet_t;
- ')
-
- dontaudit $1 jboss_iiop_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_jboss_iiop_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive jboss_iiop_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_jboss_iiop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_jboss_iiop_client_packets'($*)) dnl
-
- corenet_send_jboss_iiop_client_packets($1)
- corenet_receive_jboss_iiop_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_jboss_iiop_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive jboss_iiop_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_jboss_iiop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_jboss_iiop_client_packets'($*)) dnl
-
- corenet_dontaudit_send_jboss_iiop_client_packets($1)
- corenet_dontaudit_receive_jboss_iiop_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_jboss_iiop_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to jboss_iiop_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_jboss_iiop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_jboss_iiop_client_packets'($*)) dnl
-
- gen_require(`
- type jboss_iiop_client_packet_t;
- ')
-
- allow $1 jboss_iiop_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_jboss_iiop_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send jboss_iiop_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_jboss_iiop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_jboss_iiop_server_packets'($*)) dnl
-
- gen_require(`
- type jboss_iiop_server_packet_t;
- ')
-
- allow $1 jboss_iiop_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_jboss_iiop_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send jboss_iiop_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_jboss_iiop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_jboss_iiop_server_packets'($*)) dnl
-
- gen_require(`
- type jboss_iiop_server_packet_t;
- ')
-
- dontaudit $1 jboss_iiop_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_jboss_iiop_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive jboss_iiop_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_jboss_iiop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_jboss_iiop_server_packets'($*)) dnl
-
- gen_require(`
- type jboss_iiop_server_packet_t;
- ')
-
- allow $1 jboss_iiop_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_jboss_iiop_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive jboss_iiop_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_jboss_iiop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_jboss_iiop_server_packets'($*)) dnl
-
- gen_require(`
- type jboss_iiop_server_packet_t;
- ')
-
- dontaudit $1 jboss_iiop_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_jboss_iiop_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive jboss_iiop_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_jboss_iiop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_jboss_iiop_server_packets'($*)) dnl
-
- corenet_send_jboss_iiop_server_packets($1)
- corenet_receive_jboss_iiop_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_jboss_iiop_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive jboss_iiop_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_jboss_iiop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_jboss_iiop_server_packets'($*)) dnl
-
- corenet_dontaudit_send_jboss_iiop_server_packets($1)
- corenet_dontaudit_receive_jboss_iiop_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_jboss_iiop_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to jboss_iiop_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_jboss_iiop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_jboss_iiop_server_packets'($*)) dnl
-
- gen_require(`
- type jboss_iiop_server_packet_t;
- ')
-
- allow $1 jboss_iiop_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_jboss_iiop_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the kerberos port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_kerberos_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_kerberos_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_kerberos_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the kerberos port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_kerberos_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_kerberos_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_kerberos_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the kerberos port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_kerberos_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_kerberos_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_kerberos_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the kerberos port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_kerberos_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_kerberos_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_kerberos_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the kerberos port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_kerberos_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_kerberos_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_kerberos_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the kerberos port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_kerberos_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_kerberos_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_kerberos_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the kerberos port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_kerberos_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_kerberos_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_kerberos_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the kerberos port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_kerberos_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_kerberos_port'($*)) dnl
-
- gen_require(`
- type kerberos_port_t;
- ')
-
- allow $1 kerberos_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_kerberos_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the kerberos port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_kerberos_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_kerberos_port'($*)) dnl
-
- gen_require(`
- type kerberos_port_t;
- ')
-
- allow $1 kerberos_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_kerberos_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the kerberos port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_kerberos_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_kerberos_port'($*)) dnl
-
- gen_require(`
- type kerberos_port_t;
- ')
-
- allow $1 kerberos_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_kerberos_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send kerberos_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_kerberos_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_kerberos_client_packets'($*)) dnl
-
- gen_require(`
- type kerberos_client_packet_t;
- ')
-
- allow $1 kerberos_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_kerberos_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send kerberos_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_kerberos_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_kerberos_client_packets'($*)) dnl
-
- gen_require(`
- type kerberos_client_packet_t;
- ')
-
- dontaudit $1 kerberos_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_kerberos_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive kerberos_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_kerberos_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_kerberos_client_packets'($*)) dnl
-
- gen_require(`
- type kerberos_client_packet_t;
- ')
-
- allow $1 kerberos_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_kerberos_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive kerberos_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_kerberos_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_kerberos_client_packets'($*)) dnl
-
- gen_require(`
- type kerberos_client_packet_t;
- ')
-
- dontaudit $1 kerberos_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_kerberos_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive kerberos_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_kerberos_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_kerberos_client_packets'($*)) dnl
-
- corenet_send_kerberos_client_packets($1)
- corenet_receive_kerberos_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_kerberos_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive kerberos_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_kerberos_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_kerberos_client_packets'($*)) dnl
-
- corenet_dontaudit_send_kerberos_client_packets($1)
- corenet_dontaudit_receive_kerberos_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_kerberos_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to kerberos_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_kerberos_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_kerberos_client_packets'($*)) dnl
-
- gen_require(`
- type kerberos_client_packet_t;
- ')
-
- allow $1 kerberos_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_kerberos_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send kerberos_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_kerberos_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_kerberos_server_packets'($*)) dnl
-
- gen_require(`
- type kerberos_server_packet_t;
- ')
-
- allow $1 kerberos_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_kerberos_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send kerberos_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_kerberos_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_kerberos_server_packets'($*)) dnl
-
- gen_require(`
- type kerberos_server_packet_t;
- ')
-
- dontaudit $1 kerberos_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_kerberos_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive kerberos_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_kerberos_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_kerberos_server_packets'($*)) dnl
-
- gen_require(`
- type kerberos_server_packet_t;
- ')
-
- allow $1 kerberos_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_kerberos_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive kerberos_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_kerberos_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_kerberos_server_packets'($*)) dnl
-
- gen_require(`
- type kerberos_server_packet_t;
- ')
-
- dontaudit $1 kerberos_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_kerberos_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive kerberos_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_kerberos_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_kerberos_server_packets'($*)) dnl
-
- corenet_send_kerberos_server_packets($1)
- corenet_receive_kerberos_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_kerberos_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive kerberos_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_kerberos_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_kerberos_server_packets'($*)) dnl
-
- corenet_dontaudit_send_kerberos_server_packets($1)
- corenet_dontaudit_receive_kerberos_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_kerberos_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to kerberos_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_kerberos_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_kerberos_server_packets'($*)) dnl
-
- gen_require(`
- type kerberos_server_packet_t;
- ')
-
- allow $1 kerberos_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_kerberos_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the kerberos_admin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_kerberos_admin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_kerberos_admin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_kerberos_admin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the kerberos_admin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_kerberos_admin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_kerberos_admin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_kerberos_admin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the kerberos_admin port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_kerberos_admin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_kerberos_admin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_kerberos_admin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the kerberos_admin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_kerberos_admin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_kerberos_admin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_kerberos_admin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the kerberos_admin port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_kerberos_admin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_kerberos_admin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_kerberos_admin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the kerberos_admin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_kerberos_admin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_kerberos_admin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_kerberos_admin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the kerberos_admin port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_kerberos_admin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_kerberos_admin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_kerberos_admin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the kerberos_admin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_kerberos_admin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_kerberos_admin_port'($*)) dnl
-
- gen_require(`
- type kerberos_admin_port_t;
- ')
-
- allow $1 kerberos_admin_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_kerberos_admin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the kerberos_admin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_kerberos_admin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_kerberos_admin_port'($*)) dnl
-
- gen_require(`
- type kerberos_admin_port_t;
- ')
-
- allow $1 kerberos_admin_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_kerberos_admin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the kerberos_admin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_kerberos_admin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_kerberos_admin_port'($*)) dnl
-
- gen_require(`
- type kerberos_admin_port_t;
- ')
-
- allow $1 kerberos_admin_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_kerberos_admin_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send kerberos_admin_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_kerberos_admin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_kerberos_admin_client_packets'($*)) dnl
-
- gen_require(`
- type kerberos_admin_client_packet_t;
- ')
-
- allow $1 kerberos_admin_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_kerberos_admin_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send kerberos_admin_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_kerberos_admin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_kerberos_admin_client_packets'($*)) dnl
-
- gen_require(`
- type kerberos_admin_client_packet_t;
- ')
-
- dontaudit $1 kerberos_admin_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_kerberos_admin_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive kerberos_admin_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_kerberos_admin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_kerberos_admin_client_packets'($*)) dnl
-
- gen_require(`
- type kerberos_admin_client_packet_t;
- ')
-
- allow $1 kerberos_admin_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_kerberos_admin_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive kerberos_admin_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_kerberos_admin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_kerberos_admin_client_packets'($*)) dnl
-
- gen_require(`
- type kerberos_admin_client_packet_t;
- ')
-
- dontaudit $1 kerberos_admin_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_kerberos_admin_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive kerberos_admin_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_kerberos_admin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_kerberos_admin_client_packets'($*)) dnl
-
- corenet_send_kerberos_admin_client_packets($1)
- corenet_receive_kerberos_admin_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_kerberos_admin_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive kerberos_admin_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_kerberos_admin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_kerberos_admin_client_packets'($*)) dnl
-
- corenet_dontaudit_send_kerberos_admin_client_packets($1)
- corenet_dontaudit_receive_kerberos_admin_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_kerberos_admin_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to kerberos_admin_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_kerberos_admin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_kerberos_admin_client_packets'($*)) dnl
-
- gen_require(`
- type kerberos_admin_client_packet_t;
- ')
-
- allow $1 kerberos_admin_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_kerberos_admin_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send kerberos_admin_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_kerberos_admin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_kerberos_admin_server_packets'($*)) dnl
-
- gen_require(`
- type kerberos_admin_server_packet_t;
- ')
-
- allow $1 kerberos_admin_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_kerberos_admin_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send kerberos_admin_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_kerberos_admin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_kerberos_admin_server_packets'($*)) dnl
-
- gen_require(`
- type kerberos_admin_server_packet_t;
- ')
-
- dontaudit $1 kerberos_admin_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_kerberos_admin_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive kerberos_admin_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_kerberos_admin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_kerberos_admin_server_packets'($*)) dnl
-
- gen_require(`
- type kerberos_admin_server_packet_t;
- ')
-
- allow $1 kerberos_admin_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_kerberos_admin_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive kerberos_admin_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_kerberos_admin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_kerberos_admin_server_packets'($*)) dnl
-
- gen_require(`
- type kerberos_admin_server_packet_t;
- ')
-
- dontaudit $1 kerberos_admin_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_kerberos_admin_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive kerberos_admin_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_kerberos_admin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_kerberos_admin_server_packets'($*)) dnl
-
- corenet_send_kerberos_admin_server_packets($1)
- corenet_receive_kerberos_admin_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_kerberos_admin_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive kerberos_admin_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_kerberos_admin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_kerberos_admin_server_packets'($*)) dnl
-
- corenet_dontaudit_send_kerberos_admin_server_packets($1)
- corenet_dontaudit_receive_kerberos_admin_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_kerberos_admin_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to kerberos_admin_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_kerberos_admin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_kerberos_admin_server_packets'($*)) dnl
-
- gen_require(`
- type kerberos_admin_server_packet_t;
- ')
-
- allow $1 kerberos_admin_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_kerberos_admin_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the kerberos_master port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_kerberos_master_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_kerberos_master_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_kerberos_master_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the kerberos_master port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_kerberos_master_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_kerberos_master_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_kerberos_master_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the kerberos_master port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_kerberos_master_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_kerberos_master_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_kerberos_master_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the kerberos_master port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_kerberos_master_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_kerberos_master_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_kerberos_master_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the kerberos_master port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_kerberos_master_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_kerberos_master_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_kerberos_master_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the kerberos_master port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_kerberos_master_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_kerberos_master_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_kerberos_master_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the kerberos_master port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_kerberos_master_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_kerberos_master_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_kerberos_master_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the kerberos_master port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_kerberos_master_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_kerberos_master_port'($*)) dnl
-
- gen_require(`
- type kerberos_master_port_t;
- ')
-
- allow $1 kerberos_master_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_kerberos_master_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the kerberos_master port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_kerberos_master_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_kerberos_master_port'($*)) dnl
-
- gen_require(`
- type kerberos_master_port_t;
- ')
-
- allow $1 kerberos_master_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_kerberos_master_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the kerberos_master port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_kerberos_master_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_kerberos_master_port'($*)) dnl
-
- gen_require(`
- type kerberos_master_port_t;
- ')
-
- allow $1 kerberos_master_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_kerberos_master_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send kerberos_master_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_kerberos_master_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_kerberos_master_client_packets'($*)) dnl
-
- gen_require(`
- type kerberos_master_client_packet_t;
- ')
-
- allow $1 kerberos_master_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_kerberos_master_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send kerberos_master_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_kerberos_master_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_kerberos_master_client_packets'($*)) dnl
-
- gen_require(`
- type kerberos_master_client_packet_t;
- ')
-
- dontaudit $1 kerberos_master_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_kerberos_master_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive kerberos_master_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_kerberos_master_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_kerberos_master_client_packets'($*)) dnl
-
- gen_require(`
- type kerberos_master_client_packet_t;
- ')
-
- allow $1 kerberos_master_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_kerberos_master_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive kerberos_master_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_kerberos_master_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_kerberos_master_client_packets'($*)) dnl
-
- gen_require(`
- type kerberos_master_client_packet_t;
- ')
-
- dontaudit $1 kerberos_master_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_kerberos_master_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive kerberos_master_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_kerberos_master_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_kerberos_master_client_packets'($*)) dnl
-
- corenet_send_kerberos_master_client_packets($1)
- corenet_receive_kerberos_master_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_kerberos_master_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive kerberos_master_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_kerberos_master_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_kerberos_master_client_packets'($*)) dnl
-
- corenet_dontaudit_send_kerberos_master_client_packets($1)
- corenet_dontaudit_receive_kerberos_master_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_kerberos_master_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to kerberos_master_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_kerberos_master_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_kerberos_master_client_packets'($*)) dnl
-
- gen_require(`
- type kerberos_master_client_packet_t;
- ')
-
- allow $1 kerberos_master_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_kerberos_master_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send kerberos_master_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_kerberos_master_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_kerberos_master_server_packets'($*)) dnl
-
- gen_require(`
- type kerberos_master_server_packet_t;
- ')
-
- allow $1 kerberos_master_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_kerberos_master_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send kerberos_master_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_kerberos_master_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_kerberos_master_server_packets'($*)) dnl
-
- gen_require(`
- type kerberos_master_server_packet_t;
- ')
-
- dontaudit $1 kerberos_master_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_kerberos_master_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive kerberos_master_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_kerberos_master_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_kerberos_master_server_packets'($*)) dnl
-
- gen_require(`
- type kerberos_master_server_packet_t;
- ')
-
- allow $1 kerberos_master_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_kerberos_master_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive kerberos_master_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_kerberos_master_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_kerberos_master_server_packets'($*)) dnl
-
- gen_require(`
- type kerberos_master_server_packet_t;
- ')
-
- dontaudit $1 kerberos_master_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_kerberos_master_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive kerberos_master_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_kerberos_master_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_kerberos_master_server_packets'($*)) dnl
-
- corenet_send_kerberos_master_server_packets($1)
- corenet_receive_kerberos_master_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_kerberos_master_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive kerberos_master_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_kerberos_master_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_kerberos_master_server_packets'($*)) dnl
-
- corenet_dontaudit_send_kerberos_master_server_packets($1)
- corenet_dontaudit_receive_kerberos_master_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_kerberos_master_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to kerberos_master_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_kerberos_master_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_kerberos_master_server_packets'($*)) dnl
-
- gen_require(`
- type kerberos_master_server_packet_t;
- ')
-
- allow $1 kerberos_master_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_kerberos_master_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the kismet port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_kismet_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_kismet_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_kismet_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the kismet port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_kismet_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_kismet_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_kismet_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the kismet port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_kismet_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_kismet_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_kismet_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the kismet port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_kismet_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_kismet_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_kismet_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the kismet port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_kismet_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_kismet_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_kismet_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the kismet port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_kismet_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_kismet_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_kismet_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the kismet port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_kismet_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_kismet_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_kismet_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the kismet port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_kismet_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_kismet_port'($*)) dnl
-
- gen_require(`
- type kismet_port_t;
- ')
-
- allow $1 kismet_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_kismet_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the kismet port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_kismet_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_kismet_port'($*)) dnl
-
- gen_require(`
- type kismet_port_t;
- ')
-
- allow $1 kismet_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_kismet_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the kismet port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_kismet_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_kismet_port'($*)) dnl
-
- gen_require(`
- type kismet_port_t;
- ')
-
- allow $1 kismet_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_kismet_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send kismet_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_kismet_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_kismet_client_packets'($*)) dnl
-
- gen_require(`
- type kismet_client_packet_t;
- ')
-
- allow $1 kismet_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_kismet_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send kismet_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_kismet_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_kismet_client_packets'($*)) dnl
-
- gen_require(`
- type kismet_client_packet_t;
- ')
-
- dontaudit $1 kismet_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_kismet_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive kismet_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_kismet_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_kismet_client_packets'($*)) dnl
-
- gen_require(`
- type kismet_client_packet_t;
- ')
-
- allow $1 kismet_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_kismet_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive kismet_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_kismet_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_kismet_client_packets'($*)) dnl
-
- gen_require(`
- type kismet_client_packet_t;
- ')
-
- dontaudit $1 kismet_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_kismet_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive kismet_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_kismet_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_kismet_client_packets'($*)) dnl
-
- corenet_send_kismet_client_packets($1)
- corenet_receive_kismet_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_kismet_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive kismet_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_kismet_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_kismet_client_packets'($*)) dnl
-
- corenet_dontaudit_send_kismet_client_packets($1)
- corenet_dontaudit_receive_kismet_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_kismet_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to kismet_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_kismet_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_kismet_client_packets'($*)) dnl
-
- gen_require(`
- type kismet_client_packet_t;
- ')
-
- allow $1 kismet_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_kismet_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send kismet_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_kismet_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_kismet_server_packets'($*)) dnl
-
- gen_require(`
- type kismet_server_packet_t;
- ')
-
- allow $1 kismet_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_kismet_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send kismet_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_kismet_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_kismet_server_packets'($*)) dnl
-
- gen_require(`
- type kismet_server_packet_t;
- ')
-
- dontaudit $1 kismet_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_kismet_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive kismet_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_kismet_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_kismet_server_packets'($*)) dnl
-
- gen_require(`
- type kismet_server_packet_t;
- ')
-
- allow $1 kismet_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_kismet_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive kismet_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_kismet_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_kismet_server_packets'($*)) dnl
-
- gen_require(`
- type kismet_server_packet_t;
- ')
-
- dontaudit $1 kismet_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_kismet_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive kismet_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_kismet_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_kismet_server_packets'($*)) dnl
-
- corenet_send_kismet_server_packets($1)
- corenet_receive_kismet_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_kismet_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive kismet_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_kismet_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_kismet_server_packets'($*)) dnl
-
- corenet_dontaudit_send_kismet_server_packets($1)
- corenet_dontaudit_receive_kismet_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_kismet_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to kismet_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_kismet_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_kismet_server_packets'($*)) dnl
-
- gen_require(`
- type kismet_server_packet_t;
- ')
-
- allow $1 kismet_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_kismet_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the kdeconnect port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_kdeconnect_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_kdeconnect_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_kdeconnect_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the kdeconnect port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_kdeconnect_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_kdeconnect_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_kdeconnect_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the kdeconnect port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_kdeconnect_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_kdeconnect_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_kdeconnect_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the kdeconnect port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_kdeconnect_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_kdeconnect_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_kdeconnect_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the kdeconnect port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_kdeconnect_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_kdeconnect_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_kdeconnect_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the kdeconnect port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_kdeconnect_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_kdeconnect_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_kdeconnect_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the kdeconnect port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_kdeconnect_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_kdeconnect_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_kdeconnect_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the kdeconnect port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_kdeconnect_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_kdeconnect_port'($*)) dnl
-
- gen_require(`
- type kdeconnect_port_t;
- ')
-
- allow $1 kdeconnect_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_kdeconnect_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the kdeconnect port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_kdeconnect_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_kdeconnect_port'($*)) dnl
-
- gen_require(`
- type kdeconnect_port_t;
- ')
-
- allow $1 kdeconnect_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_kdeconnect_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the kdeconnect port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_kdeconnect_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_kdeconnect_port'($*)) dnl
-
- gen_require(`
- type kdeconnect_port_t;
- ')
-
- allow $1 kdeconnect_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_kdeconnect_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send kdeconnect_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_kdeconnect_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_kdeconnect_client_packets'($*)) dnl
-
- gen_require(`
- type kdeconnect_client_packet_t;
- ')
-
- allow $1 kdeconnect_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_kdeconnect_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send kdeconnect_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_kdeconnect_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_kdeconnect_client_packets'($*)) dnl
-
- gen_require(`
- type kdeconnect_client_packet_t;
- ')
-
- dontaudit $1 kdeconnect_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_kdeconnect_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive kdeconnect_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_kdeconnect_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_kdeconnect_client_packets'($*)) dnl
-
- gen_require(`
- type kdeconnect_client_packet_t;
- ')
-
- allow $1 kdeconnect_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_kdeconnect_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive kdeconnect_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_kdeconnect_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_kdeconnect_client_packets'($*)) dnl
-
- gen_require(`
- type kdeconnect_client_packet_t;
- ')
-
- dontaudit $1 kdeconnect_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_kdeconnect_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive kdeconnect_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_kdeconnect_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_kdeconnect_client_packets'($*)) dnl
-
- corenet_send_kdeconnect_client_packets($1)
- corenet_receive_kdeconnect_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_kdeconnect_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive kdeconnect_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_kdeconnect_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_kdeconnect_client_packets'($*)) dnl
-
- corenet_dontaudit_send_kdeconnect_client_packets($1)
- corenet_dontaudit_receive_kdeconnect_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_kdeconnect_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to kdeconnect_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_kdeconnect_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_kdeconnect_client_packets'($*)) dnl
-
- gen_require(`
- type kdeconnect_client_packet_t;
- ')
-
- allow $1 kdeconnect_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_kdeconnect_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send kdeconnect_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_kdeconnect_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_kdeconnect_server_packets'($*)) dnl
-
- gen_require(`
- type kdeconnect_server_packet_t;
- ')
-
- allow $1 kdeconnect_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_kdeconnect_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send kdeconnect_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_kdeconnect_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_kdeconnect_server_packets'($*)) dnl
-
- gen_require(`
- type kdeconnect_server_packet_t;
- ')
-
- dontaudit $1 kdeconnect_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_kdeconnect_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive kdeconnect_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_kdeconnect_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_kdeconnect_server_packets'($*)) dnl
-
- gen_require(`
- type kdeconnect_server_packet_t;
- ')
-
- allow $1 kdeconnect_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_kdeconnect_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive kdeconnect_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_kdeconnect_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_kdeconnect_server_packets'($*)) dnl
-
- gen_require(`
- type kdeconnect_server_packet_t;
- ')
-
- dontaudit $1 kdeconnect_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_kdeconnect_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive kdeconnect_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_kdeconnect_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_kdeconnect_server_packets'($*)) dnl
-
- corenet_send_kdeconnect_server_packets($1)
- corenet_receive_kdeconnect_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_kdeconnect_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive kdeconnect_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_kdeconnect_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_kdeconnect_server_packets'($*)) dnl
-
- corenet_dontaudit_send_kdeconnect_server_packets($1)
- corenet_dontaudit_receive_kdeconnect_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_kdeconnect_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to kdeconnect_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_kdeconnect_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_kdeconnect_server_packets'($*)) dnl
-
- gen_require(`
- type kdeconnect_server_packet_t;
- ')
-
- allow $1 kdeconnect_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_kdeconnect_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the kprop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_kprop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_kprop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_kprop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the kprop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_kprop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_kprop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_kprop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the kprop port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_kprop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_kprop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_kprop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the kprop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_kprop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_kprop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_kprop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the kprop port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_kprop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_kprop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_kprop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the kprop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_kprop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_kprop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_kprop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the kprop port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_kprop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_kprop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_kprop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the kprop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_kprop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_kprop_port'($*)) dnl
-
- gen_require(`
- type kprop_port_t;
- ')
-
- allow $1 kprop_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_kprop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the kprop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_kprop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_kprop_port'($*)) dnl
-
- gen_require(`
- type kprop_port_t;
- ')
-
- allow $1 kprop_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_kprop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the kprop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_kprop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_kprop_port'($*)) dnl
-
- gen_require(`
- type kprop_port_t;
- ')
-
- allow $1 kprop_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_kprop_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send kprop_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_kprop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_kprop_client_packets'($*)) dnl
-
- gen_require(`
- type kprop_client_packet_t;
- ')
-
- allow $1 kprop_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_kprop_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send kprop_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_kprop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_kprop_client_packets'($*)) dnl
-
- gen_require(`
- type kprop_client_packet_t;
- ')
-
- dontaudit $1 kprop_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_kprop_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive kprop_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_kprop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_kprop_client_packets'($*)) dnl
-
- gen_require(`
- type kprop_client_packet_t;
- ')
-
- allow $1 kprop_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_kprop_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive kprop_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_kprop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_kprop_client_packets'($*)) dnl
-
- gen_require(`
- type kprop_client_packet_t;
- ')
-
- dontaudit $1 kprop_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_kprop_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive kprop_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_kprop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_kprop_client_packets'($*)) dnl
-
- corenet_send_kprop_client_packets($1)
- corenet_receive_kprop_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_kprop_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive kprop_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_kprop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_kprop_client_packets'($*)) dnl
-
- corenet_dontaudit_send_kprop_client_packets($1)
- corenet_dontaudit_receive_kprop_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_kprop_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to kprop_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_kprop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_kprop_client_packets'($*)) dnl
-
- gen_require(`
- type kprop_client_packet_t;
- ')
-
- allow $1 kprop_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_kprop_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send kprop_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_kprop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_kprop_server_packets'($*)) dnl
-
- gen_require(`
- type kprop_server_packet_t;
- ')
-
- allow $1 kprop_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_kprop_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send kprop_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_kprop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_kprop_server_packets'($*)) dnl
-
- gen_require(`
- type kprop_server_packet_t;
- ')
-
- dontaudit $1 kprop_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_kprop_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive kprop_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_kprop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_kprop_server_packets'($*)) dnl
-
- gen_require(`
- type kprop_server_packet_t;
- ')
-
- allow $1 kprop_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_kprop_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive kprop_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_kprop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_kprop_server_packets'($*)) dnl
-
- gen_require(`
- type kprop_server_packet_t;
- ')
-
- dontaudit $1 kprop_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_kprop_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive kprop_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_kprop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_kprop_server_packets'($*)) dnl
-
- corenet_send_kprop_server_packets($1)
- corenet_receive_kprop_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_kprop_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive kprop_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_kprop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_kprop_server_packets'($*)) dnl
-
- corenet_dontaudit_send_kprop_server_packets($1)
- corenet_dontaudit_receive_kprop_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_kprop_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to kprop_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_kprop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_kprop_server_packets'($*)) dnl
-
- gen_require(`
- type kprop_server_packet_t;
- ')
-
- allow $1 kprop_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_kprop_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the ktalkd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_ktalkd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ktalkd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ktalkd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the ktalkd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_ktalkd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ktalkd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_ktalkd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the ktalkd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_ktalkd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ktalkd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ktalkd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the ktalkd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_ktalkd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ktalkd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ktalkd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the ktalkd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_ktalkd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ktalkd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ktalkd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the ktalkd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_ktalkd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ktalkd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ktalkd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the ktalkd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_ktalkd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ktalkd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ktalkd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the ktalkd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_ktalkd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ktalkd_port'($*)) dnl
-
- gen_require(`
- type ktalkd_port_t;
- ')
-
- allow $1 ktalkd_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ktalkd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the ktalkd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_ktalkd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ktalkd_port'($*)) dnl
-
- gen_require(`
- type ktalkd_port_t;
- ')
-
- allow $1 ktalkd_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ktalkd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the ktalkd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_ktalkd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ktalkd_port'($*)) dnl
-
- gen_require(`
- type ktalkd_port_t;
- ')
-
- allow $1 ktalkd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ktalkd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ktalkd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ktalkd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ktalkd_client_packets'($*)) dnl
-
- gen_require(`
- type ktalkd_client_packet_t;
- ')
-
- allow $1 ktalkd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ktalkd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ktalkd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ktalkd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ktalkd_client_packets'($*)) dnl
-
- gen_require(`
- type ktalkd_client_packet_t;
- ')
-
- dontaudit $1 ktalkd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ktalkd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ktalkd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ktalkd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ktalkd_client_packets'($*)) dnl
-
- gen_require(`
- type ktalkd_client_packet_t;
- ')
-
- allow $1 ktalkd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ktalkd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ktalkd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ktalkd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ktalkd_client_packets'($*)) dnl
-
- gen_require(`
- type ktalkd_client_packet_t;
- ')
-
- dontaudit $1 ktalkd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ktalkd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ktalkd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ktalkd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ktalkd_client_packets'($*)) dnl
-
- corenet_send_ktalkd_client_packets($1)
- corenet_receive_ktalkd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ktalkd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ktalkd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ktalkd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ktalkd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_ktalkd_client_packets($1)
- corenet_dontaudit_receive_ktalkd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ktalkd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ktalkd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ktalkd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ktalkd_client_packets'($*)) dnl
-
- gen_require(`
- type ktalkd_client_packet_t;
- ')
-
- allow $1 ktalkd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ktalkd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ktalkd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ktalkd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ktalkd_server_packets'($*)) dnl
-
- gen_require(`
- type ktalkd_server_packet_t;
- ')
-
- allow $1 ktalkd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ktalkd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ktalkd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ktalkd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ktalkd_server_packets'($*)) dnl
-
- gen_require(`
- type ktalkd_server_packet_t;
- ')
-
- dontaudit $1 ktalkd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ktalkd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ktalkd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ktalkd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ktalkd_server_packets'($*)) dnl
-
- gen_require(`
- type ktalkd_server_packet_t;
- ')
-
- allow $1 ktalkd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ktalkd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ktalkd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ktalkd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ktalkd_server_packets'($*)) dnl
-
- gen_require(`
- type ktalkd_server_packet_t;
- ')
-
- dontaudit $1 ktalkd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ktalkd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ktalkd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ktalkd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ktalkd_server_packets'($*)) dnl
-
- corenet_send_ktalkd_server_packets($1)
- corenet_receive_ktalkd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ktalkd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ktalkd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ktalkd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ktalkd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_ktalkd_server_packets($1)
- corenet_dontaudit_receive_ktalkd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ktalkd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ktalkd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ktalkd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ktalkd_server_packets'($*)) dnl
-
- gen_require(`
- type ktalkd_server_packet_t;
- ')
-
- allow $1 ktalkd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ktalkd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the l2tp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_l2tp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_l2tp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_l2tp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the l2tp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_l2tp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_l2tp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_l2tp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the l2tp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_l2tp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_l2tp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_l2tp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the l2tp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_l2tp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_l2tp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_l2tp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the l2tp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_l2tp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_l2tp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_l2tp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the l2tp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_l2tp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_l2tp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_l2tp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the l2tp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_l2tp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_l2tp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_l2tp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the l2tp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_l2tp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_l2tp_port'($*)) dnl
-
- gen_require(`
- type l2tp_port_t;
- ')
-
- allow $1 l2tp_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_l2tp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the l2tp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_l2tp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_l2tp_port'($*)) dnl
-
- gen_require(`
- type l2tp_port_t;
- ')
-
- allow $1 l2tp_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_l2tp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the l2tp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_l2tp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_l2tp_port'($*)) dnl
-
- gen_require(`
- type l2tp_port_t;
- ')
-
- allow $1 l2tp_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_l2tp_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send l2tp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_l2tp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_l2tp_client_packets'($*)) dnl
-
- gen_require(`
- type l2tp_client_packet_t;
- ')
-
- allow $1 l2tp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_l2tp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send l2tp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_l2tp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_l2tp_client_packets'($*)) dnl
-
- gen_require(`
- type l2tp_client_packet_t;
- ')
-
- dontaudit $1 l2tp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_l2tp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive l2tp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_l2tp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_l2tp_client_packets'($*)) dnl
-
- gen_require(`
- type l2tp_client_packet_t;
- ')
-
- allow $1 l2tp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_l2tp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive l2tp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_l2tp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_l2tp_client_packets'($*)) dnl
-
- gen_require(`
- type l2tp_client_packet_t;
- ')
-
- dontaudit $1 l2tp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_l2tp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive l2tp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_l2tp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_l2tp_client_packets'($*)) dnl
-
- corenet_send_l2tp_client_packets($1)
- corenet_receive_l2tp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_l2tp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive l2tp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_l2tp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_l2tp_client_packets'($*)) dnl
-
- corenet_dontaudit_send_l2tp_client_packets($1)
- corenet_dontaudit_receive_l2tp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_l2tp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to l2tp_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_l2tp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_l2tp_client_packets'($*)) dnl
-
- gen_require(`
- type l2tp_client_packet_t;
- ')
-
- allow $1 l2tp_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_l2tp_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send l2tp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_l2tp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_l2tp_server_packets'($*)) dnl
-
- gen_require(`
- type l2tp_server_packet_t;
- ')
-
- allow $1 l2tp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_l2tp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send l2tp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_l2tp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_l2tp_server_packets'($*)) dnl
-
- gen_require(`
- type l2tp_server_packet_t;
- ')
-
- dontaudit $1 l2tp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_l2tp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive l2tp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_l2tp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_l2tp_server_packets'($*)) dnl
-
- gen_require(`
- type l2tp_server_packet_t;
- ')
-
- allow $1 l2tp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_l2tp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive l2tp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_l2tp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_l2tp_server_packets'($*)) dnl
-
- gen_require(`
- type l2tp_server_packet_t;
- ')
-
- dontaudit $1 l2tp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_l2tp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive l2tp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_l2tp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_l2tp_server_packets'($*)) dnl
-
- corenet_send_l2tp_server_packets($1)
- corenet_receive_l2tp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_l2tp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive l2tp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_l2tp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_l2tp_server_packets'($*)) dnl
-
- corenet_dontaudit_send_l2tp_server_packets($1)
- corenet_dontaudit_receive_l2tp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_l2tp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to l2tp_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_l2tp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_l2tp_server_packets'($*)) dnl
-
- gen_require(`
- type l2tp_server_packet_t;
- ')
-
- allow $1 l2tp_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_l2tp_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the ldap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_ldap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ldap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ldap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the ldap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_ldap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ldap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_ldap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the ldap port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_ldap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ldap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ldap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the ldap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_ldap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ldap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ldap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the ldap port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_ldap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ldap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ldap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the ldap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_ldap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ldap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ldap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the ldap port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_ldap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ldap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ldap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the ldap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_ldap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ldap_port'($*)) dnl
-
- gen_require(`
- type ldap_port_t;
- ')
-
- allow $1 ldap_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ldap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the ldap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_ldap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ldap_port'($*)) dnl
-
- gen_require(`
- type ldap_port_t;
- ')
-
- allow $1 ldap_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ldap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the ldap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_ldap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ldap_port'($*)) dnl
-
- gen_require(`
- type ldap_port_t;
- ')
-
- allow $1 ldap_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ldap_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ldap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ldap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ldap_client_packets'($*)) dnl
-
- gen_require(`
- type ldap_client_packet_t;
- ')
-
- allow $1 ldap_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ldap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ldap_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ldap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ldap_client_packets'($*)) dnl
-
- gen_require(`
- type ldap_client_packet_t;
- ')
-
- dontaudit $1 ldap_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ldap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ldap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ldap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ldap_client_packets'($*)) dnl
-
- gen_require(`
- type ldap_client_packet_t;
- ')
-
- allow $1 ldap_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ldap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ldap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ldap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ldap_client_packets'($*)) dnl
-
- gen_require(`
- type ldap_client_packet_t;
- ')
-
- dontaudit $1 ldap_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ldap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ldap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ldap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ldap_client_packets'($*)) dnl
-
- corenet_send_ldap_client_packets($1)
- corenet_receive_ldap_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ldap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ldap_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ldap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ldap_client_packets'($*)) dnl
-
- corenet_dontaudit_send_ldap_client_packets($1)
- corenet_dontaudit_receive_ldap_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ldap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ldap_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ldap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ldap_client_packets'($*)) dnl
-
- gen_require(`
- type ldap_client_packet_t;
- ')
-
- allow $1 ldap_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ldap_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ldap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ldap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ldap_server_packets'($*)) dnl
-
- gen_require(`
- type ldap_server_packet_t;
- ')
-
- allow $1 ldap_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ldap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ldap_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ldap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ldap_server_packets'($*)) dnl
-
- gen_require(`
- type ldap_server_packet_t;
- ')
-
- dontaudit $1 ldap_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ldap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ldap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ldap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ldap_server_packets'($*)) dnl
-
- gen_require(`
- type ldap_server_packet_t;
- ')
-
- allow $1 ldap_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ldap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ldap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ldap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ldap_server_packets'($*)) dnl
-
- gen_require(`
- type ldap_server_packet_t;
- ')
-
- dontaudit $1 ldap_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ldap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ldap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ldap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ldap_server_packets'($*)) dnl
-
- corenet_send_ldap_server_packets($1)
- corenet_receive_ldap_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ldap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ldap_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ldap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ldap_server_packets'($*)) dnl
-
- corenet_dontaudit_send_ldap_server_packets($1)
- corenet_dontaudit_receive_ldap_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ldap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ldap_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ldap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ldap_server_packets'($*)) dnl
-
- gen_require(`
- type ldap_server_packet_t;
- ')
-
- allow $1 ldap_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ldap_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the lirc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_lirc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_lirc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_lirc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the lirc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_lirc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_lirc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_lirc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the lirc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_lirc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_lirc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_lirc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the lirc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_lirc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_lirc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_lirc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the lirc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_lirc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_lirc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_lirc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the lirc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_lirc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_lirc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_lirc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the lirc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_lirc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_lirc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_lirc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the lirc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_lirc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_lirc_port'($*)) dnl
-
- gen_require(`
- type lirc_port_t;
- ')
-
- allow $1 lirc_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_lirc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the lirc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_lirc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_lirc_port'($*)) dnl
-
- gen_require(`
- type lirc_port_t;
- ')
-
- allow $1 lirc_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_lirc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the lirc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_lirc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_lirc_port'($*)) dnl
-
- gen_require(`
- type lirc_port_t;
- ')
-
- allow $1 lirc_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_lirc_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send lirc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_lirc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_lirc_client_packets'($*)) dnl
-
- gen_require(`
- type lirc_client_packet_t;
- ')
-
- allow $1 lirc_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_lirc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send lirc_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_lirc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_lirc_client_packets'($*)) dnl
-
- gen_require(`
- type lirc_client_packet_t;
- ')
-
- dontaudit $1 lirc_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_lirc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive lirc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_lirc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_lirc_client_packets'($*)) dnl
-
- gen_require(`
- type lirc_client_packet_t;
- ')
-
- allow $1 lirc_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_lirc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive lirc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_lirc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_lirc_client_packets'($*)) dnl
-
- gen_require(`
- type lirc_client_packet_t;
- ')
-
- dontaudit $1 lirc_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_lirc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive lirc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_lirc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_lirc_client_packets'($*)) dnl
-
- corenet_send_lirc_client_packets($1)
- corenet_receive_lirc_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_lirc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive lirc_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_lirc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_lirc_client_packets'($*)) dnl
-
- corenet_dontaudit_send_lirc_client_packets($1)
- corenet_dontaudit_receive_lirc_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_lirc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to lirc_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_lirc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_lirc_client_packets'($*)) dnl
-
- gen_require(`
- type lirc_client_packet_t;
- ')
-
- allow $1 lirc_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_lirc_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send lirc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_lirc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_lirc_server_packets'($*)) dnl
-
- gen_require(`
- type lirc_server_packet_t;
- ')
-
- allow $1 lirc_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_lirc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send lirc_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_lirc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_lirc_server_packets'($*)) dnl
-
- gen_require(`
- type lirc_server_packet_t;
- ')
-
- dontaudit $1 lirc_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_lirc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive lirc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_lirc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_lirc_server_packets'($*)) dnl
-
- gen_require(`
- type lirc_server_packet_t;
- ')
-
- allow $1 lirc_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_lirc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive lirc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_lirc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_lirc_server_packets'($*)) dnl
-
- gen_require(`
- type lirc_server_packet_t;
- ')
-
- dontaudit $1 lirc_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_lirc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive lirc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_lirc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_lirc_server_packets'($*)) dnl
-
- corenet_send_lirc_server_packets($1)
- corenet_receive_lirc_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_lirc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive lirc_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_lirc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_lirc_server_packets'($*)) dnl
-
- corenet_dontaudit_send_lirc_server_packets($1)
- corenet_dontaudit_receive_lirc_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_lirc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to lirc_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_lirc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_lirc_server_packets'($*)) dnl
-
- gen_require(`
- type lirc_server_packet_t;
- ')
-
- allow $1 lirc_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_lirc_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the llmnr port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_llmnr_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_llmnr_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_llmnr_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the llmnr port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_llmnr_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_llmnr_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_llmnr_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the llmnr port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_llmnr_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_llmnr_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_llmnr_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the llmnr port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_llmnr_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_llmnr_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_llmnr_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the llmnr port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_llmnr_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_llmnr_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_llmnr_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the llmnr port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_llmnr_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_llmnr_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_llmnr_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the llmnr port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_llmnr_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_llmnr_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_llmnr_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the llmnr port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_llmnr_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_llmnr_port'($*)) dnl
-
- gen_require(`
- type llmnr_port_t;
- ')
-
- allow $1 llmnr_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_llmnr_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the llmnr port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_llmnr_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_llmnr_port'($*)) dnl
-
- gen_require(`
- type llmnr_port_t;
- ')
-
- allow $1 llmnr_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_llmnr_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the llmnr port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_llmnr_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_llmnr_port'($*)) dnl
-
- gen_require(`
- type llmnr_port_t;
- ')
-
- allow $1 llmnr_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_llmnr_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send llmnr_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_llmnr_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_llmnr_client_packets'($*)) dnl
-
- gen_require(`
- type llmnr_client_packet_t;
- ')
-
- allow $1 llmnr_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_llmnr_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send llmnr_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_llmnr_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_llmnr_client_packets'($*)) dnl
-
- gen_require(`
- type llmnr_client_packet_t;
- ')
-
- dontaudit $1 llmnr_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_llmnr_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive llmnr_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_llmnr_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_llmnr_client_packets'($*)) dnl
-
- gen_require(`
- type llmnr_client_packet_t;
- ')
-
- allow $1 llmnr_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_llmnr_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive llmnr_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_llmnr_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_llmnr_client_packets'($*)) dnl
-
- gen_require(`
- type llmnr_client_packet_t;
- ')
-
- dontaudit $1 llmnr_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_llmnr_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive llmnr_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_llmnr_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_llmnr_client_packets'($*)) dnl
-
- corenet_send_llmnr_client_packets($1)
- corenet_receive_llmnr_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_llmnr_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive llmnr_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_llmnr_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_llmnr_client_packets'($*)) dnl
-
- corenet_dontaudit_send_llmnr_client_packets($1)
- corenet_dontaudit_receive_llmnr_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_llmnr_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to llmnr_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_llmnr_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_llmnr_client_packets'($*)) dnl
-
- gen_require(`
- type llmnr_client_packet_t;
- ')
-
- allow $1 llmnr_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_llmnr_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send llmnr_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_llmnr_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_llmnr_server_packets'($*)) dnl
-
- gen_require(`
- type llmnr_server_packet_t;
- ')
-
- allow $1 llmnr_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_llmnr_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send llmnr_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_llmnr_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_llmnr_server_packets'($*)) dnl
-
- gen_require(`
- type llmnr_server_packet_t;
- ')
-
- dontaudit $1 llmnr_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_llmnr_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive llmnr_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_llmnr_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_llmnr_server_packets'($*)) dnl
-
- gen_require(`
- type llmnr_server_packet_t;
- ')
-
- allow $1 llmnr_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_llmnr_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive llmnr_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_llmnr_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_llmnr_server_packets'($*)) dnl
-
- gen_require(`
- type llmnr_server_packet_t;
- ')
-
- dontaudit $1 llmnr_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_llmnr_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive llmnr_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_llmnr_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_llmnr_server_packets'($*)) dnl
-
- corenet_send_llmnr_server_packets($1)
- corenet_receive_llmnr_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_llmnr_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive llmnr_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_llmnr_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_llmnr_server_packets'($*)) dnl
-
- corenet_dontaudit_send_llmnr_server_packets($1)
- corenet_dontaudit_receive_llmnr_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_llmnr_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to llmnr_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_llmnr_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_llmnr_server_packets'($*)) dnl
-
- gen_require(`
- type llmnr_server_packet_t;
- ')
-
- allow $1 llmnr_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_llmnr_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the lmtp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_lmtp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_lmtp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_lmtp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the lmtp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_lmtp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_lmtp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_lmtp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the lmtp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_lmtp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_lmtp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_lmtp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the lmtp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_lmtp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_lmtp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_lmtp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the lmtp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_lmtp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_lmtp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_lmtp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the lmtp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_lmtp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_lmtp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_lmtp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the lmtp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_lmtp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_lmtp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_lmtp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the lmtp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_lmtp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_lmtp_port'($*)) dnl
-
- gen_require(`
- type lmtp_port_t;
- ')
-
- allow $1 lmtp_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_lmtp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the lmtp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_lmtp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_lmtp_port'($*)) dnl
-
- gen_require(`
- type lmtp_port_t;
- ')
-
- allow $1 lmtp_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_lmtp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the lmtp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_lmtp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_lmtp_port'($*)) dnl
-
- gen_require(`
- type lmtp_port_t;
- ')
-
- allow $1 lmtp_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_lmtp_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send lmtp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_lmtp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_lmtp_client_packets'($*)) dnl
-
- gen_require(`
- type lmtp_client_packet_t;
- ')
-
- allow $1 lmtp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_lmtp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send lmtp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_lmtp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_lmtp_client_packets'($*)) dnl
-
- gen_require(`
- type lmtp_client_packet_t;
- ')
-
- dontaudit $1 lmtp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_lmtp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive lmtp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_lmtp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_lmtp_client_packets'($*)) dnl
-
- gen_require(`
- type lmtp_client_packet_t;
- ')
-
- allow $1 lmtp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_lmtp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive lmtp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_lmtp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_lmtp_client_packets'($*)) dnl
-
- gen_require(`
- type lmtp_client_packet_t;
- ')
-
- dontaudit $1 lmtp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_lmtp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive lmtp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_lmtp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_lmtp_client_packets'($*)) dnl
-
- corenet_send_lmtp_client_packets($1)
- corenet_receive_lmtp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_lmtp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive lmtp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_lmtp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_lmtp_client_packets'($*)) dnl
-
- corenet_dontaudit_send_lmtp_client_packets($1)
- corenet_dontaudit_receive_lmtp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_lmtp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to lmtp_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_lmtp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_lmtp_client_packets'($*)) dnl
-
- gen_require(`
- type lmtp_client_packet_t;
- ')
-
- allow $1 lmtp_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_lmtp_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send lmtp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_lmtp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_lmtp_server_packets'($*)) dnl
-
- gen_require(`
- type lmtp_server_packet_t;
- ')
-
- allow $1 lmtp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_lmtp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send lmtp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_lmtp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_lmtp_server_packets'($*)) dnl
-
- gen_require(`
- type lmtp_server_packet_t;
- ')
-
- dontaudit $1 lmtp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_lmtp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive lmtp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_lmtp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_lmtp_server_packets'($*)) dnl
-
- gen_require(`
- type lmtp_server_packet_t;
- ')
-
- allow $1 lmtp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_lmtp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive lmtp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_lmtp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_lmtp_server_packets'($*)) dnl
-
- gen_require(`
- type lmtp_server_packet_t;
- ')
-
- dontaudit $1 lmtp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_lmtp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive lmtp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_lmtp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_lmtp_server_packets'($*)) dnl
-
- corenet_send_lmtp_server_packets($1)
- corenet_receive_lmtp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_lmtp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive lmtp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_lmtp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_lmtp_server_packets'($*)) dnl
-
- corenet_dontaudit_send_lmtp_server_packets($1)
- corenet_dontaudit_receive_lmtp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_lmtp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to lmtp_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_lmtp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_lmtp_server_packets'($*)) dnl
-
- gen_require(`
- type lmtp_server_packet_t;
- ')
-
- allow $1 lmtp_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_lmtp_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the lrrd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_lrrd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_lrrd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_lrrd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the lrrd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_lrrd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_lrrd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_lrrd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the lrrd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_lrrd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_lrrd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_lrrd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the lrrd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_lrrd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_lrrd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_lrrd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the lrrd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_lrrd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_lrrd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_lrrd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the lrrd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_lrrd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_lrrd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_lrrd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the lrrd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_lrrd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_lrrd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_lrrd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the lrrd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_lrrd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_lrrd_port'($*)) dnl
-
- gen_require(`
- type lrrd_port_t;
- ')
-
- allow $1 lrrd_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_lrrd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the lrrd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_lrrd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_lrrd_port'($*)) dnl
-
- gen_require(`
- type lrrd_port_t;
- ')
-
- allow $1 lrrd_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_lrrd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the lrrd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_lrrd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_lrrd_port'($*)) dnl
-
- gen_require(`
- type lrrd_port_t;
- ')
-
- allow $1 lrrd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_lrrd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send lrrd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_lrrd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_lrrd_client_packets'($*)) dnl
-
- gen_require(`
- type lrrd_client_packet_t;
- ')
-
- allow $1 lrrd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_lrrd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send lrrd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_lrrd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_lrrd_client_packets'($*)) dnl
-
- gen_require(`
- type lrrd_client_packet_t;
- ')
-
- dontaudit $1 lrrd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_lrrd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive lrrd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_lrrd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_lrrd_client_packets'($*)) dnl
-
- gen_require(`
- type lrrd_client_packet_t;
- ')
-
- allow $1 lrrd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_lrrd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive lrrd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_lrrd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_lrrd_client_packets'($*)) dnl
-
- gen_require(`
- type lrrd_client_packet_t;
- ')
-
- dontaudit $1 lrrd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_lrrd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive lrrd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_lrrd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_lrrd_client_packets'($*)) dnl
-
- corenet_send_lrrd_client_packets($1)
- corenet_receive_lrrd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_lrrd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive lrrd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_lrrd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_lrrd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_lrrd_client_packets($1)
- corenet_dontaudit_receive_lrrd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_lrrd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to lrrd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_lrrd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_lrrd_client_packets'($*)) dnl
-
- gen_require(`
- type lrrd_client_packet_t;
- ')
-
- allow $1 lrrd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_lrrd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send lrrd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_lrrd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_lrrd_server_packets'($*)) dnl
-
- gen_require(`
- type lrrd_server_packet_t;
- ')
-
- allow $1 lrrd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_lrrd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send lrrd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_lrrd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_lrrd_server_packets'($*)) dnl
-
- gen_require(`
- type lrrd_server_packet_t;
- ')
-
- dontaudit $1 lrrd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_lrrd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive lrrd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_lrrd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_lrrd_server_packets'($*)) dnl
-
- gen_require(`
- type lrrd_server_packet_t;
- ')
-
- allow $1 lrrd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_lrrd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive lrrd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_lrrd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_lrrd_server_packets'($*)) dnl
-
- gen_require(`
- type lrrd_server_packet_t;
- ')
-
- dontaudit $1 lrrd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_lrrd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive lrrd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_lrrd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_lrrd_server_packets'($*)) dnl
-
- corenet_send_lrrd_server_packets($1)
- corenet_receive_lrrd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_lrrd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive lrrd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_lrrd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_lrrd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_lrrd_server_packets($1)
- corenet_dontaudit_receive_lrrd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_lrrd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to lrrd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_lrrd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_lrrd_server_packets'($*)) dnl
-
- gen_require(`
- type lrrd_server_packet_t;
- ')
-
- allow $1 lrrd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_lrrd_server_packets'($*)) dnl
- ')
-
-
- # no defined portcon
-
-
-########################################
-##
-## Send and receive TCP traffic on the mail port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_mail_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_mail_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_mail_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the mail port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_mail_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_mail_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_mail_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the mail port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_mail_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_mail_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_mail_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the mail port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_mail_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_mail_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_mail_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the mail port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_mail_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_mail_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_mail_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the mail port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_mail_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_mail_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_mail_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the mail port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_mail_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_mail_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_mail_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the mail port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_mail_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_mail_port'($*)) dnl
-
- gen_require(`
- type mail_port_t;
- ')
-
- allow $1 mail_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_mail_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the mail port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_mail_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_mail_port'($*)) dnl
-
- gen_require(`
- type mail_port_t;
- ')
-
- allow $1 mail_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_mail_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the mail port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_mail_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_mail_port'($*)) dnl
-
- gen_require(`
- type mail_port_t;
- ')
-
- allow $1 mail_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_mail_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send mail_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_mail_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_mail_client_packets'($*)) dnl
-
- gen_require(`
- type mail_client_packet_t;
- ')
-
- allow $1 mail_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_mail_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send mail_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_mail_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mail_client_packets'($*)) dnl
-
- gen_require(`
- type mail_client_packet_t;
- ')
-
- dontaudit $1 mail_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mail_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive mail_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_mail_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_mail_client_packets'($*)) dnl
-
- gen_require(`
- type mail_client_packet_t;
- ')
-
- allow $1 mail_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_mail_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive mail_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_mail_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mail_client_packets'($*)) dnl
-
- gen_require(`
- type mail_client_packet_t;
- ')
-
- dontaudit $1 mail_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mail_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive mail_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_mail_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mail_client_packets'($*)) dnl
-
- corenet_send_mail_client_packets($1)
- corenet_receive_mail_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mail_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive mail_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_mail_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mail_client_packets'($*)) dnl
-
- corenet_dontaudit_send_mail_client_packets($1)
- corenet_dontaudit_receive_mail_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mail_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to mail_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_mail_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mail_client_packets'($*)) dnl
-
- gen_require(`
- type mail_client_packet_t;
- ')
-
- allow $1 mail_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_mail_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send mail_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_mail_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_mail_server_packets'($*)) dnl
-
- gen_require(`
- type mail_server_packet_t;
- ')
-
- allow $1 mail_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_mail_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send mail_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_mail_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mail_server_packets'($*)) dnl
-
- gen_require(`
- type mail_server_packet_t;
- ')
-
- dontaudit $1 mail_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mail_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive mail_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_mail_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_mail_server_packets'($*)) dnl
-
- gen_require(`
- type mail_server_packet_t;
- ')
-
- allow $1 mail_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_mail_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive mail_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_mail_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mail_server_packets'($*)) dnl
-
- gen_require(`
- type mail_server_packet_t;
- ')
-
- dontaudit $1 mail_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mail_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive mail_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_mail_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mail_server_packets'($*)) dnl
-
- corenet_send_mail_server_packets($1)
- corenet_receive_mail_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mail_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive mail_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_mail_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mail_server_packets'($*)) dnl
-
- corenet_dontaudit_send_mail_server_packets($1)
- corenet_dontaudit_receive_mail_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mail_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to mail_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_mail_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mail_server_packets'($*)) dnl
-
- gen_require(`
- type mail_server_packet_t;
- ')
-
- allow $1 mail_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_mail_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the matahari port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_matahari_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_matahari_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_matahari_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the matahari port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_matahari_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_matahari_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_matahari_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the matahari port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_matahari_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_matahari_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_matahari_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the matahari port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_matahari_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_matahari_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_matahari_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the matahari port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_matahari_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_matahari_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_matahari_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the matahari port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_matahari_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_matahari_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_matahari_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the matahari port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_matahari_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_matahari_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_matahari_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the matahari port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_matahari_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_matahari_port'($*)) dnl
-
- gen_require(`
- type matahari_port_t;
- ')
-
- allow $1 matahari_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_matahari_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the matahari port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_matahari_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_matahari_port'($*)) dnl
-
- gen_require(`
- type matahari_port_t;
- ')
-
- allow $1 matahari_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_matahari_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the matahari port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_matahari_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_matahari_port'($*)) dnl
-
- gen_require(`
- type matahari_port_t;
- ')
-
- allow $1 matahari_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_matahari_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send matahari_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_matahari_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_matahari_client_packets'($*)) dnl
-
- gen_require(`
- type matahari_client_packet_t;
- ')
-
- allow $1 matahari_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_matahari_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send matahari_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_matahari_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_matahari_client_packets'($*)) dnl
-
- gen_require(`
- type matahari_client_packet_t;
- ')
-
- dontaudit $1 matahari_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_matahari_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive matahari_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_matahari_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_matahari_client_packets'($*)) dnl
-
- gen_require(`
- type matahari_client_packet_t;
- ')
-
- allow $1 matahari_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_matahari_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive matahari_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_matahari_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_matahari_client_packets'($*)) dnl
-
- gen_require(`
- type matahari_client_packet_t;
- ')
-
- dontaudit $1 matahari_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_matahari_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive matahari_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_matahari_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_matahari_client_packets'($*)) dnl
-
- corenet_send_matahari_client_packets($1)
- corenet_receive_matahari_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_matahari_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive matahari_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_matahari_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_matahari_client_packets'($*)) dnl
-
- corenet_dontaudit_send_matahari_client_packets($1)
- corenet_dontaudit_receive_matahari_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_matahari_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to matahari_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_matahari_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_matahari_client_packets'($*)) dnl
-
- gen_require(`
- type matahari_client_packet_t;
- ')
-
- allow $1 matahari_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_matahari_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send matahari_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_matahari_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_matahari_server_packets'($*)) dnl
-
- gen_require(`
- type matahari_server_packet_t;
- ')
-
- allow $1 matahari_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_matahari_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send matahari_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_matahari_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_matahari_server_packets'($*)) dnl
-
- gen_require(`
- type matahari_server_packet_t;
- ')
-
- dontaudit $1 matahari_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_matahari_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive matahari_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_matahari_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_matahari_server_packets'($*)) dnl
-
- gen_require(`
- type matahari_server_packet_t;
- ')
-
- allow $1 matahari_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_matahari_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive matahari_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_matahari_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_matahari_server_packets'($*)) dnl
-
- gen_require(`
- type matahari_server_packet_t;
- ')
-
- dontaudit $1 matahari_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_matahari_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive matahari_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_matahari_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_matahari_server_packets'($*)) dnl
-
- corenet_send_matahari_server_packets($1)
- corenet_receive_matahari_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_matahari_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive matahari_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_matahari_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_matahari_server_packets'($*)) dnl
-
- corenet_dontaudit_send_matahari_server_packets($1)
- corenet_dontaudit_receive_matahari_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_matahari_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to matahari_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_matahari_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_matahari_server_packets'($*)) dnl
-
- gen_require(`
- type matahari_server_packet_t;
- ')
-
- allow $1 matahari_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_matahari_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the memcache port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_memcache_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_memcache_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_memcache_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the memcache port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_memcache_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_memcache_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_memcache_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the memcache port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_memcache_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_memcache_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_memcache_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the memcache port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_memcache_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_memcache_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_memcache_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the memcache port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_memcache_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_memcache_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_memcache_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the memcache port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_memcache_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_memcache_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_memcache_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the memcache port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_memcache_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_memcache_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_memcache_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the memcache port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_memcache_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_memcache_port'($*)) dnl
-
- gen_require(`
- type memcache_port_t;
- ')
-
- allow $1 memcache_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_memcache_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the memcache port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_memcache_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_memcache_port'($*)) dnl
-
- gen_require(`
- type memcache_port_t;
- ')
-
- allow $1 memcache_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_memcache_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the memcache port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_memcache_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_memcache_port'($*)) dnl
-
- gen_require(`
- type memcache_port_t;
- ')
-
- allow $1 memcache_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_memcache_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send memcache_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_memcache_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_memcache_client_packets'($*)) dnl
-
- gen_require(`
- type memcache_client_packet_t;
- ')
-
- allow $1 memcache_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_memcache_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send memcache_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_memcache_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_memcache_client_packets'($*)) dnl
-
- gen_require(`
- type memcache_client_packet_t;
- ')
-
- dontaudit $1 memcache_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_memcache_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive memcache_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_memcache_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_memcache_client_packets'($*)) dnl
-
- gen_require(`
- type memcache_client_packet_t;
- ')
-
- allow $1 memcache_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_memcache_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive memcache_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_memcache_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_memcache_client_packets'($*)) dnl
-
- gen_require(`
- type memcache_client_packet_t;
- ')
-
- dontaudit $1 memcache_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_memcache_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive memcache_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_memcache_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_memcache_client_packets'($*)) dnl
-
- corenet_send_memcache_client_packets($1)
- corenet_receive_memcache_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_memcache_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive memcache_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_memcache_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_memcache_client_packets'($*)) dnl
-
- corenet_dontaudit_send_memcache_client_packets($1)
- corenet_dontaudit_receive_memcache_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_memcache_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to memcache_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_memcache_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_memcache_client_packets'($*)) dnl
-
- gen_require(`
- type memcache_client_packet_t;
- ')
-
- allow $1 memcache_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_memcache_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send memcache_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_memcache_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_memcache_server_packets'($*)) dnl
-
- gen_require(`
- type memcache_server_packet_t;
- ')
-
- allow $1 memcache_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_memcache_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send memcache_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_memcache_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_memcache_server_packets'($*)) dnl
-
- gen_require(`
- type memcache_server_packet_t;
- ')
-
- dontaudit $1 memcache_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_memcache_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive memcache_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_memcache_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_memcache_server_packets'($*)) dnl
-
- gen_require(`
- type memcache_server_packet_t;
- ')
-
- allow $1 memcache_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_memcache_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive memcache_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_memcache_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_memcache_server_packets'($*)) dnl
-
- gen_require(`
- type memcache_server_packet_t;
- ')
-
- dontaudit $1 memcache_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_memcache_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive memcache_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_memcache_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_memcache_server_packets'($*)) dnl
-
- corenet_send_memcache_server_packets($1)
- corenet_receive_memcache_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_memcache_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive memcache_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_memcache_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_memcache_server_packets'($*)) dnl
-
- corenet_dontaudit_send_memcache_server_packets($1)
- corenet_dontaudit_receive_memcache_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_memcache_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to memcache_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_memcache_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_memcache_server_packets'($*)) dnl
-
- gen_require(`
- type memcache_server_packet_t;
- ')
-
- allow $1 memcache_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_memcache_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the milter port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_milter_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_milter_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_milter_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the milter port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_milter_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_milter_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_milter_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the milter port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_milter_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_milter_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_milter_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the milter port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_milter_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_milter_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_milter_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the milter port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_milter_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_milter_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_milter_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the milter port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_milter_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_milter_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_milter_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the milter port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_milter_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_milter_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_milter_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the milter port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_milter_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_milter_port'($*)) dnl
-
- gen_require(`
- type milter_port_t;
- ')
-
- allow $1 milter_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_milter_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the milter port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_milter_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_milter_port'($*)) dnl
-
- gen_require(`
- type milter_port_t;
- ')
-
- allow $1 milter_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_milter_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the milter port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_milter_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_milter_port'($*)) dnl
-
- gen_require(`
- type milter_port_t;
- ')
-
- allow $1 milter_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_milter_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send milter_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_milter_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_milter_client_packets'($*)) dnl
-
- gen_require(`
- type milter_client_packet_t;
- ')
-
- allow $1 milter_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_milter_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send milter_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_milter_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_milter_client_packets'($*)) dnl
-
- gen_require(`
- type milter_client_packet_t;
- ')
-
- dontaudit $1 milter_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_milter_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive milter_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_milter_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_milter_client_packets'($*)) dnl
-
- gen_require(`
- type milter_client_packet_t;
- ')
-
- allow $1 milter_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_milter_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive milter_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_milter_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_milter_client_packets'($*)) dnl
-
- gen_require(`
- type milter_client_packet_t;
- ')
-
- dontaudit $1 milter_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_milter_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive milter_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_milter_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_milter_client_packets'($*)) dnl
-
- corenet_send_milter_client_packets($1)
- corenet_receive_milter_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_milter_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive milter_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_milter_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_milter_client_packets'($*)) dnl
-
- corenet_dontaudit_send_milter_client_packets($1)
- corenet_dontaudit_receive_milter_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_milter_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to milter_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_milter_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_milter_client_packets'($*)) dnl
-
- gen_require(`
- type milter_client_packet_t;
- ')
-
- allow $1 milter_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_milter_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send milter_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_milter_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_milter_server_packets'($*)) dnl
-
- gen_require(`
- type milter_server_packet_t;
- ')
-
- allow $1 milter_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_milter_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send milter_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_milter_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_milter_server_packets'($*)) dnl
-
- gen_require(`
- type milter_server_packet_t;
- ')
-
- dontaudit $1 milter_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_milter_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive milter_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_milter_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_milter_server_packets'($*)) dnl
-
- gen_require(`
- type milter_server_packet_t;
- ')
-
- allow $1 milter_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_milter_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive milter_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_milter_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_milter_server_packets'($*)) dnl
-
- gen_require(`
- type milter_server_packet_t;
- ')
-
- dontaudit $1 milter_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_milter_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive milter_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_milter_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_milter_server_packets'($*)) dnl
-
- corenet_send_milter_server_packets($1)
- corenet_receive_milter_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_milter_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive milter_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_milter_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_milter_server_packets'($*)) dnl
-
- corenet_dontaudit_send_milter_server_packets($1)
- corenet_dontaudit_receive_milter_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_milter_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to milter_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_milter_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_milter_server_packets'($*)) dnl
-
- gen_require(`
- type milter_server_packet_t;
- ')
-
- allow $1 milter_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_milter_server_packets'($*)) dnl
- ')
-
-
- # no defined portcon
-
-
-########################################
-##
-## Send and receive TCP traffic on the mmcc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_mmcc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_mmcc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_mmcc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the mmcc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_mmcc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_mmcc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_mmcc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the mmcc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_mmcc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_mmcc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_mmcc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the mmcc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_mmcc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_mmcc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_mmcc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the mmcc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_mmcc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_mmcc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_mmcc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the mmcc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_mmcc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_mmcc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_mmcc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the mmcc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_mmcc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_mmcc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_mmcc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the mmcc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_mmcc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_mmcc_port'($*)) dnl
-
- gen_require(`
- type mmcc_port_t;
- ')
-
- allow $1 mmcc_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_mmcc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the mmcc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_mmcc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_mmcc_port'($*)) dnl
-
- gen_require(`
- type mmcc_port_t;
- ')
-
- allow $1 mmcc_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_mmcc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the mmcc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_mmcc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_mmcc_port'($*)) dnl
-
- gen_require(`
- type mmcc_port_t;
- ')
-
- allow $1 mmcc_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_mmcc_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send mmcc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_mmcc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_mmcc_client_packets'($*)) dnl
-
- gen_require(`
- type mmcc_client_packet_t;
- ')
-
- allow $1 mmcc_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_mmcc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send mmcc_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_mmcc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mmcc_client_packets'($*)) dnl
-
- gen_require(`
- type mmcc_client_packet_t;
- ')
-
- dontaudit $1 mmcc_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mmcc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive mmcc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_mmcc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_mmcc_client_packets'($*)) dnl
-
- gen_require(`
- type mmcc_client_packet_t;
- ')
-
- allow $1 mmcc_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_mmcc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive mmcc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_mmcc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mmcc_client_packets'($*)) dnl
-
- gen_require(`
- type mmcc_client_packet_t;
- ')
-
- dontaudit $1 mmcc_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mmcc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive mmcc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_mmcc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mmcc_client_packets'($*)) dnl
-
- corenet_send_mmcc_client_packets($1)
- corenet_receive_mmcc_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mmcc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive mmcc_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_mmcc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mmcc_client_packets'($*)) dnl
-
- corenet_dontaudit_send_mmcc_client_packets($1)
- corenet_dontaudit_receive_mmcc_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mmcc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to mmcc_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_mmcc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mmcc_client_packets'($*)) dnl
-
- gen_require(`
- type mmcc_client_packet_t;
- ')
-
- allow $1 mmcc_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_mmcc_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send mmcc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_mmcc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_mmcc_server_packets'($*)) dnl
-
- gen_require(`
- type mmcc_server_packet_t;
- ')
-
- allow $1 mmcc_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_mmcc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send mmcc_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_mmcc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mmcc_server_packets'($*)) dnl
-
- gen_require(`
- type mmcc_server_packet_t;
- ')
-
- dontaudit $1 mmcc_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mmcc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive mmcc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_mmcc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_mmcc_server_packets'($*)) dnl
-
- gen_require(`
- type mmcc_server_packet_t;
- ')
-
- allow $1 mmcc_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_mmcc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive mmcc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_mmcc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mmcc_server_packets'($*)) dnl
-
- gen_require(`
- type mmcc_server_packet_t;
- ')
-
- dontaudit $1 mmcc_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mmcc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive mmcc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_mmcc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mmcc_server_packets'($*)) dnl
-
- corenet_send_mmcc_server_packets($1)
- corenet_receive_mmcc_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mmcc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive mmcc_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_mmcc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mmcc_server_packets'($*)) dnl
-
- corenet_dontaudit_send_mmcc_server_packets($1)
- corenet_dontaudit_receive_mmcc_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mmcc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to mmcc_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_mmcc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mmcc_server_packets'($*)) dnl
-
- gen_require(`
- type mmcc_server_packet_t;
- ')
-
- allow $1 mmcc_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_mmcc_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the mon port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_mon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_mon_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_mon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the mon port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_mon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_mon_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_mon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the mon port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_mon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_mon_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_mon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the mon port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_mon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_mon_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_mon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the mon port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_mon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_mon_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_mon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the mon port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_mon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_mon_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_mon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the mon port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_mon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_mon_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_mon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the mon port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_mon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_mon_port'($*)) dnl
-
- gen_require(`
- type mon_port_t;
- ')
-
- allow $1 mon_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_mon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the mon port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_mon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_mon_port'($*)) dnl
-
- gen_require(`
- type mon_port_t;
- ')
-
- allow $1 mon_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_mon_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the mon port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_mon_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_mon_port'($*)) dnl
-
- gen_require(`
- type mon_port_t;
- ')
-
- allow $1 mon_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_mon_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send mon_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_mon_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_mon_client_packets'($*)) dnl
-
- gen_require(`
- type mon_client_packet_t;
- ')
-
- allow $1 mon_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_mon_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send mon_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_mon_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mon_client_packets'($*)) dnl
-
- gen_require(`
- type mon_client_packet_t;
- ')
-
- dontaudit $1 mon_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mon_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive mon_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_mon_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_mon_client_packets'($*)) dnl
-
- gen_require(`
- type mon_client_packet_t;
- ')
-
- allow $1 mon_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_mon_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive mon_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_mon_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mon_client_packets'($*)) dnl
-
- gen_require(`
- type mon_client_packet_t;
- ')
-
- dontaudit $1 mon_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mon_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive mon_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_mon_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mon_client_packets'($*)) dnl
-
- corenet_send_mon_client_packets($1)
- corenet_receive_mon_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mon_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive mon_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_mon_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mon_client_packets'($*)) dnl
-
- corenet_dontaudit_send_mon_client_packets($1)
- corenet_dontaudit_receive_mon_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mon_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to mon_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_mon_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mon_client_packets'($*)) dnl
-
- gen_require(`
- type mon_client_packet_t;
- ')
-
- allow $1 mon_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_mon_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send mon_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_mon_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_mon_server_packets'($*)) dnl
-
- gen_require(`
- type mon_server_packet_t;
- ')
-
- allow $1 mon_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_mon_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send mon_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_mon_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mon_server_packets'($*)) dnl
-
- gen_require(`
- type mon_server_packet_t;
- ')
-
- dontaudit $1 mon_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mon_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive mon_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_mon_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_mon_server_packets'($*)) dnl
-
- gen_require(`
- type mon_server_packet_t;
- ')
-
- allow $1 mon_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_mon_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive mon_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_mon_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mon_server_packets'($*)) dnl
-
- gen_require(`
- type mon_server_packet_t;
- ')
-
- dontaudit $1 mon_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mon_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive mon_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_mon_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mon_server_packets'($*)) dnl
-
- corenet_send_mon_server_packets($1)
- corenet_receive_mon_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mon_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive mon_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_mon_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mon_server_packets'($*)) dnl
-
- corenet_dontaudit_send_mon_server_packets($1)
- corenet_dontaudit_receive_mon_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mon_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to mon_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_mon_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mon_server_packets'($*)) dnl
-
- gen_require(`
- type mon_server_packet_t;
- ')
-
- allow $1 mon_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_mon_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the monit port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_monit_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_monit_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_monit_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the monit port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_monit_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_monit_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_monit_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the monit port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_monit_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_monit_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_monit_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the monit port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_monit_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_monit_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_monit_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the monit port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_monit_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_monit_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_monit_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the monit port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_monit_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_monit_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_monit_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the monit port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_monit_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_monit_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_monit_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the monit port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_monit_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_monit_port'($*)) dnl
-
- gen_require(`
- type monit_port_t;
- ')
-
- allow $1 monit_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_monit_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the monit port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_monit_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_monit_port'($*)) dnl
-
- gen_require(`
- type monit_port_t;
- ')
-
- allow $1 monit_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_monit_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the monit port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_monit_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_monit_port'($*)) dnl
-
- gen_require(`
- type monit_port_t;
- ')
-
- allow $1 monit_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_monit_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send monit_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_monit_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_monit_client_packets'($*)) dnl
-
- gen_require(`
- type monit_client_packet_t;
- ')
-
- allow $1 monit_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_monit_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send monit_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_monit_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_monit_client_packets'($*)) dnl
-
- gen_require(`
- type monit_client_packet_t;
- ')
-
- dontaudit $1 monit_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_monit_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive monit_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_monit_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_monit_client_packets'($*)) dnl
-
- gen_require(`
- type monit_client_packet_t;
- ')
-
- allow $1 monit_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_monit_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive monit_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_monit_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_monit_client_packets'($*)) dnl
-
- gen_require(`
- type monit_client_packet_t;
- ')
-
- dontaudit $1 monit_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_monit_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive monit_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_monit_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_monit_client_packets'($*)) dnl
-
- corenet_send_monit_client_packets($1)
- corenet_receive_monit_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_monit_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive monit_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_monit_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_monit_client_packets'($*)) dnl
-
- corenet_dontaudit_send_monit_client_packets($1)
- corenet_dontaudit_receive_monit_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_monit_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to monit_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_monit_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_monit_client_packets'($*)) dnl
-
- gen_require(`
- type monit_client_packet_t;
- ')
-
- allow $1 monit_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_monit_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send monit_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_monit_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_monit_server_packets'($*)) dnl
-
- gen_require(`
- type monit_server_packet_t;
- ')
-
- allow $1 monit_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_monit_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send monit_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_monit_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_monit_server_packets'($*)) dnl
-
- gen_require(`
- type monit_server_packet_t;
- ')
-
- dontaudit $1 monit_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_monit_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive monit_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_monit_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_monit_server_packets'($*)) dnl
-
- gen_require(`
- type monit_server_packet_t;
- ')
-
- allow $1 monit_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_monit_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive monit_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_monit_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_monit_server_packets'($*)) dnl
-
- gen_require(`
- type monit_server_packet_t;
- ')
-
- dontaudit $1 monit_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_monit_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive monit_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_monit_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_monit_server_packets'($*)) dnl
-
- corenet_send_monit_server_packets($1)
- corenet_receive_monit_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_monit_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive monit_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_monit_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_monit_server_packets'($*)) dnl
-
- corenet_dontaudit_send_monit_server_packets($1)
- corenet_dontaudit_receive_monit_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_monit_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to monit_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_monit_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_monit_server_packets'($*)) dnl
-
- gen_require(`
- type monit_server_packet_t;
- ')
-
- allow $1 monit_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_monit_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the monopd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_monopd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_monopd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_monopd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the monopd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_monopd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_monopd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_monopd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the monopd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_monopd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_monopd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_monopd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the monopd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_monopd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_monopd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_monopd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the monopd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_monopd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_monopd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_monopd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the monopd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_monopd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_monopd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_monopd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the monopd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_monopd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_monopd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_monopd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the monopd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_monopd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_monopd_port'($*)) dnl
-
- gen_require(`
- type monopd_port_t;
- ')
-
- allow $1 monopd_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_monopd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the monopd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_monopd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_monopd_port'($*)) dnl
-
- gen_require(`
- type monopd_port_t;
- ')
-
- allow $1 monopd_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_monopd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the monopd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_monopd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_monopd_port'($*)) dnl
-
- gen_require(`
- type monopd_port_t;
- ')
-
- allow $1 monopd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_monopd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send monopd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_monopd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_monopd_client_packets'($*)) dnl
-
- gen_require(`
- type monopd_client_packet_t;
- ')
-
- allow $1 monopd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_monopd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send monopd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_monopd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_monopd_client_packets'($*)) dnl
-
- gen_require(`
- type monopd_client_packet_t;
- ')
-
- dontaudit $1 monopd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_monopd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive monopd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_monopd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_monopd_client_packets'($*)) dnl
-
- gen_require(`
- type monopd_client_packet_t;
- ')
-
- allow $1 monopd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_monopd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive monopd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_monopd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_monopd_client_packets'($*)) dnl
-
- gen_require(`
- type monopd_client_packet_t;
- ')
-
- dontaudit $1 monopd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_monopd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive monopd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_monopd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_monopd_client_packets'($*)) dnl
-
- corenet_send_monopd_client_packets($1)
- corenet_receive_monopd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_monopd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive monopd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_monopd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_monopd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_monopd_client_packets($1)
- corenet_dontaudit_receive_monopd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_monopd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to monopd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_monopd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_monopd_client_packets'($*)) dnl
-
- gen_require(`
- type monopd_client_packet_t;
- ')
-
- allow $1 monopd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_monopd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send monopd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_monopd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_monopd_server_packets'($*)) dnl
-
- gen_require(`
- type monopd_server_packet_t;
- ')
-
- allow $1 monopd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_monopd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send monopd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_monopd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_monopd_server_packets'($*)) dnl
-
- gen_require(`
- type monopd_server_packet_t;
- ')
-
- dontaudit $1 monopd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_monopd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive monopd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_monopd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_monopd_server_packets'($*)) dnl
-
- gen_require(`
- type monopd_server_packet_t;
- ')
-
- allow $1 monopd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_monopd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive monopd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_monopd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_monopd_server_packets'($*)) dnl
-
- gen_require(`
- type monopd_server_packet_t;
- ')
-
- dontaudit $1 monopd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_monopd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive monopd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_monopd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_monopd_server_packets'($*)) dnl
-
- corenet_send_monopd_server_packets($1)
- corenet_receive_monopd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_monopd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive monopd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_monopd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_monopd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_monopd_server_packets($1)
- corenet_dontaudit_receive_monopd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_monopd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to monopd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_monopd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_monopd_server_packets'($*)) dnl
-
- gen_require(`
- type monopd_server_packet_t;
- ')
-
- allow $1 monopd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_monopd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the mountd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_mountd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_mountd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_mountd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the mountd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_mountd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_mountd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_mountd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the mountd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_mountd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_mountd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_mountd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the mountd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_mountd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_mountd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_mountd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the mountd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_mountd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_mountd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_mountd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the mountd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_mountd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_mountd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_mountd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the mountd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_mountd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_mountd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_mountd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the mountd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_mountd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_mountd_port'($*)) dnl
-
- gen_require(`
- type mountd_port_t;
- ')
-
- allow $1 mountd_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_mountd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the mountd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_mountd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_mountd_port'($*)) dnl
-
- gen_require(`
- type mountd_port_t;
- ')
-
- allow $1 mountd_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_mountd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the mountd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_mountd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_mountd_port'($*)) dnl
-
- gen_require(`
- type mountd_port_t;
- ')
-
- allow $1 mountd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_mountd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send mountd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_mountd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_mountd_client_packets'($*)) dnl
-
- gen_require(`
- type mountd_client_packet_t;
- ')
-
- allow $1 mountd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_mountd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send mountd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_mountd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mountd_client_packets'($*)) dnl
-
- gen_require(`
- type mountd_client_packet_t;
- ')
-
- dontaudit $1 mountd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mountd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive mountd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_mountd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_mountd_client_packets'($*)) dnl
-
- gen_require(`
- type mountd_client_packet_t;
- ')
-
- allow $1 mountd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_mountd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive mountd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_mountd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mountd_client_packets'($*)) dnl
-
- gen_require(`
- type mountd_client_packet_t;
- ')
-
- dontaudit $1 mountd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mountd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive mountd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_mountd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mountd_client_packets'($*)) dnl
-
- corenet_send_mountd_client_packets($1)
- corenet_receive_mountd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mountd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive mountd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_mountd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mountd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_mountd_client_packets($1)
- corenet_dontaudit_receive_mountd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mountd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to mountd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_mountd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mountd_client_packets'($*)) dnl
-
- gen_require(`
- type mountd_client_packet_t;
- ')
-
- allow $1 mountd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_mountd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send mountd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_mountd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_mountd_server_packets'($*)) dnl
-
- gen_require(`
- type mountd_server_packet_t;
- ')
-
- allow $1 mountd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_mountd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send mountd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_mountd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mountd_server_packets'($*)) dnl
-
- gen_require(`
- type mountd_server_packet_t;
- ')
-
- dontaudit $1 mountd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mountd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive mountd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_mountd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_mountd_server_packets'($*)) dnl
-
- gen_require(`
- type mountd_server_packet_t;
- ')
-
- allow $1 mountd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_mountd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive mountd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_mountd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mountd_server_packets'($*)) dnl
-
- gen_require(`
- type mountd_server_packet_t;
- ')
-
- dontaudit $1 mountd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mountd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive mountd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_mountd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mountd_server_packets'($*)) dnl
-
- corenet_send_mountd_server_packets($1)
- corenet_receive_mountd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mountd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive mountd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_mountd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mountd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_mountd_server_packets($1)
- corenet_dontaudit_receive_mountd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mountd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to mountd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_mountd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mountd_server_packets'($*)) dnl
-
- gen_require(`
- type mountd_server_packet_t;
- ')
-
- allow $1 mountd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_mountd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the movaz_ssc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_movaz_ssc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_movaz_ssc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_movaz_ssc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the movaz_ssc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_movaz_ssc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_movaz_ssc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_movaz_ssc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the movaz_ssc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_movaz_ssc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_movaz_ssc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_movaz_ssc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the movaz_ssc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_movaz_ssc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_movaz_ssc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_movaz_ssc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the movaz_ssc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_movaz_ssc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_movaz_ssc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_movaz_ssc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the movaz_ssc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_movaz_ssc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_movaz_ssc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_movaz_ssc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the movaz_ssc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_movaz_ssc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_movaz_ssc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_movaz_ssc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the movaz_ssc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_movaz_ssc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_movaz_ssc_port'($*)) dnl
-
- gen_require(`
- type movaz_ssc_port_t;
- ')
-
- allow $1 movaz_ssc_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_movaz_ssc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the movaz_ssc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_movaz_ssc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_movaz_ssc_port'($*)) dnl
-
- gen_require(`
- type movaz_ssc_port_t;
- ')
-
- allow $1 movaz_ssc_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_movaz_ssc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the movaz_ssc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_movaz_ssc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_movaz_ssc_port'($*)) dnl
-
- gen_require(`
- type movaz_ssc_port_t;
- ')
-
- allow $1 movaz_ssc_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_movaz_ssc_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send movaz_ssc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_movaz_ssc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_movaz_ssc_client_packets'($*)) dnl
-
- gen_require(`
- type movaz_ssc_client_packet_t;
- ')
-
- allow $1 movaz_ssc_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_movaz_ssc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send movaz_ssc_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_movaz_ssc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_movaz_ssc_client_packets'($*)) dnl
-
- gen_require(`
- type movaz_ssc_client_packet_t;
- ')
-
- dontaudit $1 movaz_ssc_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_movaz_ssc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive movaz_ssc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_movaz_ssc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_movaz_ssc_client_packets'($*)) dnl
-
- gen_require(`
- type movaz_ssc_client_packet_t;
- ')
-
- allow $1 movaz_ssc_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_movaz_ssc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive movaz_ssc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_movaz_ssc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_movaz_ssc_client_packets'($*)) dnl
-
- gen_require(`
- type movaz_ssc_client_packet_t;
- ')
-
- dontaudit $1 movaz_ssc_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_movaz_ssc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive movaz_ssc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_movaz_ssc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_movaz_ssc_client_packets'($*)) dnl
-
- corenet_send_movaz_ssc_client_packets($1)
- corenet_receive_movaz_ssc_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_movaz_ssc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive movaz_ssc_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_movaz_ssc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_movaz_ssc_client_packets'($*)) dnl
-
- corenet_dontaudit_send_movaz_ssc_client_packets($1)
- corenet_dontaudit_receive_movaz_ssc_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_movaz_ssc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to movaz_ssc_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_movaz_ssc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_movaz_ssc_client_packets'($*)) dnl
-
- gen_require(`
- type movaz_ssc_client_packet_t;
- ')
-
- allow $1 movaz_ssc_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_movaz_ssc_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send movaz_ssc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_movaz_ssc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_movaz_ssc_server_packets'($*)) dnl
-
- gen_require(`
- type movaz_ssc_server_packet_t;
- ')
-
- allow $1 movaz_ssc_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_movaz_ssc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send movaz_ssc_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_movaz_ssc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_movaz_ssc_server_packets'($*)) dnl
-
- gen_require(`
- type movaz_ssc_server_packet_t;
- ')
-
- dontaudit $1 movaz_ssc_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_movaz_ssc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive movaz_ssc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_movaz_ssc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_movaz_ssc_server_packets'($*)) dnl
-
- gen_require(`
- type movaz_ssc_server_packet_t;
- ')
-
- allow $1 movaz_ssc_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_movaz_ssc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive movaz_ssc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_movaz_ssc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_movaz_ssc_server_packets'($*)) dnl
-
- gen_require(`
- type movaz_ssc_server_packet_t;
- ')
-
- dontaudit $1 movaz_ssc_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_movaz_ssc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive movaz_ssc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_movaz_ssc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_movaz_ssc_server_packets'($*)) dnl
-
- corenet_send_movaz_ssc_server_packets($1)
- corenet_receive_movaz_ssc_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_movaz_ssc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive movaz_ssc_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_movaz_ssc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_movaz_ssc_server_packets'($*)) dnl
-
- corenet_dontaudit_send_movaz_ssc_server_packets($1)
- corenet_dontaudit_receive_movaz_ssc_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_movaz_ssc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to movaz_ssc_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_movaz_ssc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_movaz_ssc_server_packets'($*)) dnl
-
- gen_require(`
- type movaz_ssc_server_packet_t;
- ')
-
- allow $1 movaz_ssc_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_movaz_ssc_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the mpd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_mpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_mpd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_mpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the mpd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_mpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_mpd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_mpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the mpd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_mpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_mpd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_mpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the mpd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_mpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_mpd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_mpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the mpd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_mpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_mpd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_mpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the mpd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_mpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_mpd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_mpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the mpd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_mpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_mpd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_mpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the mpd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_mpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_mpd_port'($*)) dnl
-
- gen_require(`
- type mpd_port_t;
- ')
-
- allow $1 mpd_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_mpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the mpd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_mpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_mpd_port'($*)) dnl
-
- gen_require(`
- type mpd_port_t;
- ')
-
- allow $1 mpd_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_mpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the mpd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_mpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_mpd_port'($*)) dnl
-
- gen_require(`
- type mpd_port_t;
- ')
-
- allow $1 mpd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_mpd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send mpd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_mpd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_mpd_client_packets'($*)) dnl
-
- gen_require(`
- type mpd_client_packet_t;
- ')
-
- allow $1 mpd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_mpd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send mpd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_mpd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mpd_client_packets'($*)) dnl
-
- gen_require(`
- type mpd_client_packet_t;
- ')
-
- dontaudit $1 mpd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mpd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive mpd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_mpd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_mpd_client_packets'($*)) dnl
-
- gen_require(`
- type mpd_client_packet_t;
- ')
-
- allow $1 mpd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_mpd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive mpd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_mpd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mpd_client_packets'($*)) dnl
-
- gen_require(`
- type mpd_client_packet_t;
- ')
-
- dontaudit $1 mpd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mpd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive mpd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_mpd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mpd_client_packets'($*)) dnl
-
- corenet_send_mpd_client_packets($1)
- corenet_receive_mpd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mpd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive mpd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_mpd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mpd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_mpd_client_packets($1)
- corenet_dontaudit_receive_mpd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mpd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to mpd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_mpd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mpd_client_packets'($*)) dnl
-
- gen_require(`
- type mpd_client_packet_t;
- ')
-
- allow $1 mpd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_mpd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send mpd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_mpd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_mpd_server_packets'($*)) dnl
-
- gen_require(`
- type mpd_server_packet_t;
- ')
-
- allow $1 mpd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_mpd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send mpd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_mpd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mpd_server_packets'($*)) dnl
-
- gen_require(`
- type mpd_server_packet_t;
- ')
-
- dontaudit $1 mpd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mpd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive mpd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_mpd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_mpd_server_packets'($*)) dnl
-
- gen_require(`
- type mpd_server_packet_t;
- ')
-
- allow $1 mpd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_mpd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive mpd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_mpd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mpd_server_packets'($*)) dnl
-
- gen_require(`
- type mpd_server_packet_t;
- ')
-
- dontaudit $1 mpd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mpd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive mpd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_mpd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mpd_server_packets'($*)) dnl
-
- corenet_send_mpd_server_packets($1)
- corenet_receive_mpd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mpd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive mpd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_mpd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mpd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_mpd_server_packets($1)
- corenet_dontaudit_receive_mpd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mpd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to mpd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_mpd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mpd_server_packets'($*)) dnl
-
- gen_require(`
- type mpd_server_packet_t;
- ')
-
- allow $1 mpd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_mpd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the msgsrvr port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_msgsrvr_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_msgsrvr_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_msgsrvr_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the msgsrvr port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_msgsrvr_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_msgsrvr_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_msgsrvr_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the msgsrvr port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_msgsrvr_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_msgsrvr_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_msgsrvr_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the msgsrvr port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_msgsrvr_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_msgsrvr_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_msgsrvr_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the msgsrvr port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_msgsrvr_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_msgsrvr_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_msgsrvr_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the msgsrvr port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_msgsrvr_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_msgsrvr_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_msgsrvr_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the msgsrvr port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_msgsrvr_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_msgsrvr_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_msgsrvr_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the msgsrvr port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_msgsrvr_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_msgsrvr_port'($*)) dnl
-
- gen_require(`
- type msgsrvr_port_t;
- ')
-
- allow $1 msgsrvr_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_msgsrvr_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the msgsrvr port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_msgsrvr_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_msgsrvr_port'($*)) dnl
-
- gen_require(`
- type msgsrvr_port_t;
- ')
-
- allow $1 msgsrvr_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_msgsrvr_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the msgsrvr port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_msgsrvr_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_msgsrvr_port'($*)) dnl
-
- gen_require(`
- type msgsrvr_port_t;
- ')
-
- allow $1 msgsrvr_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_msgsrvr_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send msgsrvr_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_msgsrvr_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_msgsrvr_client_packets'($*)) dnl
-
- gen_require(`
- type msgsrvr_client_packet_t;
- ')
-
- allow $1 msgsrvr_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_msgsrvr_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send msgsrvr_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_msgsrvr_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_msgsrvr_client_packets'($*)) dnl
-
- gen_require(`
- type msgsrvr_client_packet_t;
- ')
-
- dontaudit $1 msgsrvr_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_msgsrvr_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive msgsrvr_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_msgsrvr_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_msgsrvr_client_packets'($*)) dnl
-
- gen_require(`
- type msgsrvr_client_packet_t;
- ')
-
- allow $1 msgsrvr_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_msgsrvr_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive msgsrvr_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_msgsrvr_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_msgsrvr_client_packets'($*)) dnl
-
- gen_require(`
- type msgsrvr_client_packet_t;
- ')
-
- dontaudit $1 msgsrvr_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_msgsrvr_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive msgsrvr_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_msgsrvr_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_msgsrvr_client_packets'($*)) dnl
-
- corenet_send_msgsrvr_client_packets($1)
- corenet_receive_msgsrvr_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_msgsrvr_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive msgsrvr_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_msgsrvr_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_msgsrvr_client_packets'($*)) dnl
-
- corenet_dontaudit_send_msgsrvr_client_packets($1)
- corenet_dontaudit_receive_msgsrvr_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_msgsrvr_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to msgsrvr_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_msgsrvr_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_msgsrvr_client_packets'($*)) dnl
-
- gen_require(`
- type msgsrvr_client_packet_t;
- ')
-
- allow $1 msgsrvr_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_msgsrvr_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send msgsrvr_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_msgsrvr_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_msgsrvr_server_packets'($*)) dnl
-
- gen_require(`
- type msgsrvr_server_packet_t;
- ')
-
- allow $1 msgsrvr_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_msgsrvr_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send msgsrvr_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_msgsrvr_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_msgsrvr_server_packets'($*)) dnl
-
- gen_require(`
- type msgsrvr_server_packet_t;
- ')
-
- dontaudit $1 msgsrvr_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_msgsrvr_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive msgsrvr_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_msgsrvr_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_msgsrvr_server_packets'($*)) dnl
-
- gen_require(`
- type msgsrvr_server_packet_t;
- ')
-
- allow $1 msgsrvr_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_msgsrvr_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive msgsrvr_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_msgsrvr_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_msgsrvr_server_packets'($*)) dnl
-
- gen_require(`
- type msgsrvr_server_packet_t;
- ')
-
- dontaudit $1 msgsrvr_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_msgsrvr_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive msgsrvr_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_msgsrvr_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_msgsrvr_server_packets'($*)) dnl
-
- corenet_send_msgsrvr_server_packets($1)
- corenet_receive_msgsrvr_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_msgsrvr_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive msgsrvr_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_msgsrvr_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_msgsrvr_server_packets'($*)) dnl
-
- corenet_dontaudit_send_msgsrvr_server_packets($1)
- corenet_dontaudit_receive_msgsrvr_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_msgsrvr_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to msgsrvr_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_msgsrvr_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_msgsrvr_server_packets'($*)) dnl
-
- gen_require(`
- type msgsrvr_server_packet_t;
- ')
-
- allow $1 msgsrvr_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_msgsrvr_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the msnp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_msnp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_msnp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_msnp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the msnp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_msnp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_msnp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_msnp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the msnp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_msnp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_msnp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_msnp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the msnp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_msnp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_msnp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_msnp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the msnp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_msnp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_msnp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_msnp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the msnp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_msnp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_msnp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_msnp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the msnp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_msnp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_msnp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_msnp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the msnp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_msnp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_msnp_port'($*)) dnl
-
- gen_require(`
- type msnp_port_t;
- ')
-
- allow $1 msnp_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_msnp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the msnp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_msnp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_msnp_port'($*)) dnl
-
- gen_require(`
- type msnp_port_t;
- ')
-
- allow $1 msnp_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_msnp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the msnp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_msnp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_msnp_port'($*)) dnl
-
- gen_require(`
- type msnp_port_t;
- ')
-
- allow $1 msnp_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_msnp_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send msnp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_msnp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_msnp_client_packets'($*)) dnl
-
- gen_require(`
- type msnp_client_packet_t;
- ')
-
- allow $1 msnp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_msnp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send msnp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_msnp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_msnp_client_packets'($*)) dnl
-
- gen_require(`
- type msnp_client_packet_t;
- ')
-
- dontaudit $1 msnp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_msnp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive msnp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_msnp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_msnp_client_packets'($*)) dnl
-
- gen_require(`
- type msnp_client_packet_t;
- ')
-
- allow $1 msnp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_msnp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive msnp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_msnp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_msnp_client_packets'($*)) dnl
-
- gen_require(`
- type msnp_client_packet_t;
- ')
-
- dontaudit $1 msnp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_msnp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive msnp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_msnp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_msnp_client_packets'($*)) dnl
-
- corenet_send_msnp_client_packets($1)
- corenet_receive_msnp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_msnp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive msnp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_msnp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_msnp_client_packets'($*)) dnl
-
- corenet_dontaudit_send_msnp_client_packets($1)
- corenet_dontaudit_receive_msnp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_msnp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to msnp_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_msnp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_msnp_client_packets'($*)) dnl
-
- gen_require(`
- type msnp_client_packet_t;
- ')
-
- allow $1 msnp_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_msnp_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send msnp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_msnp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_msnp_server_packets'($*)) dnl
-
- gen_require(`
- type msnp_server_packet_t;
- ')
-
- allow $1 msnp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_msnp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send msnp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_msnp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_msnp_server_packets'($*)) dnl
-
- gen_require(`
- type msnp_server_packet_t;
- ')
-
- dontaudit $1 msnp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_msnp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive msnp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_msnp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_msnp_server_packets'($*)) dnl
-
- gen_require(`
- type msnp_server_packet_t;
- ')
-
- allow $1 msnp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_msnp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive msnp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_msnp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_msnp_server_packets'($*)) dnl
-
- gen_require(`
- type msnp_server_packet_t;
- ')
-
- dontaudit $1 msnp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_msnp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive msnp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_msnp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_msnp_server_packets'($*)) dnl
-
- corenet_send_msnp_server_packets($1)
- corenet_receive_msnp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_msnp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive msnp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_msnp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_msnp_server_packets'($*)) dnl
-
- corenet_dontaudit_send_msnp_server_packets($1)
- corenet_dontaudit_receive_msnp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_msnp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to msnp_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_msnp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_msnp_server_packets'($*)) dnl
-
- gen_require(`
- type msnp_server_packet_t;
- ')
-
- allow $1 msnp_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_msnp_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the mssql port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_mssql_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_mssql_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_mssql_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the mssql port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_mssql_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_mssql_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_mssql_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the mssql port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_mssql_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_mssql_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_mssql_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the mssql port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_mssql_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_mssql_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_mssql_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the mssql port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_mssql_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_mssql_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_mssql_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the mssql port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_mssql_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_mssql_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_mssql_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the mssql port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_mssql_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_mssql_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_mssql_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the mssql port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_mssql_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_mssql_port'($*)) dnl
-
- gen_require(`
- type mssql_port_t;
- ')
-
- allow $1 mssql_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_mssql_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the mssql port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_mssql_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_mssql_port'($*)) dnl
-
- gen_require(`
- type mssql_port_t;
- ')
-
- allow $1 mssql_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_mssql_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the mssql port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_mssql_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_mssql_port'($*)) dnl
-
- gen_require(`
- type mssql_port_t;
- ')
-
- allow $1 mssql_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_mssql_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send mssql_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_mssql_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_mssql_client_packets'($*)) dnl
-
- gen_require(`
- type mssql_client_packet_t;
- ')
-
- allow $1 mssql_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_mssql_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send mssql_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_mssql_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mssql_client_packets'($*)) dnl
-
- gen_require(`
- type mssql_client_packet_t;
- ')
-
- dontaudit $1 mssql_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mssql_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive mssql_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_mssql_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_mssql_client_packets'($*)) dnl
-
- gen_require(`
- type mssql_client_packet_t;
- ')
-
- allow $1 mssql_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_mssql_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive mssql_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_mssql_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mssql_client_packets'($*)) dnl
-
- gen_require(`
- type mssql_client_packet_t;
- ')
-
- dontaudit $1 mssql_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mssql_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive mssql_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_mssql_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mssql_client_packets'($*)) dnl
-
- corenet_send_mssql_client_packets($1)
- corenet_receive_mssql_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mssql_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive mssql_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_mssql_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mssql_client_packets'($*)) dnl
-
- corenet_dontaudit_send_mssql_client_packets($1)
- corenet_dontaudit_receive_mssql_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mssql_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to mssql_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_mssql_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mssql_client_packets'($*)) dnl
-
- gen_require(`
- type mssql_client_packet_t;
- ')
-
- allow $1 mssql_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_mssql_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send mssql_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_mssql_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_mssql_server_packets'($*)) dnl
-
- gen_require(`
- type mssql_server_packet_t;
- ')
-
- allow $1 mssql_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_mssql_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send mssql_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_mssql_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mssql_server_packets'($*)) dnl
-
- gen_require(`
- type mssql_server_packet_t;
- ')
-
- dontaudit $1 mssql_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mssql_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive mssql_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_mssql_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_mssql_server_packets'($*)) dnl
-
- gen_require(`
- type mssql_server_packet_t;
- ')
-
- allow $1 mssql_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_mssql_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive mssql_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_mssql_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mssql_server_packets'($*)) dnl
-
- gen_require(`
- type mssql_server_packet_t;
- ')
-
- dontaudit $1 mssql_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mssql_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive mssql_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_mssql_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mssql_server_packets'($*)) dnl
-
- corenet_send_mssql_server_packets($1)
- corenet_receive_mssql_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mssql_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive mssql_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_mssql_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mssql_server_packets'($*)) dnl
-
- corenet_dontaudit_send_mssql_server_packets($1)
- corenet_dontaudit_receive_mssql_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mssql_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to mssql_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_mssql_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mssql_server_packets'($*)) dnl
-
- gen_require(`
- type mssql_server_packet_t;
- ')
-
- allow $1 mssql_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_mssql_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the ms_streaming port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_ms_streaming_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ms_streaming_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ms_streaming_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the ms_streaming port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_ms_streaming_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ms_streaming_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_ms_streaming_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the ms_streaming port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_ms_streaming_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ms_streaming_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ms_streaming_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the ms_streaming port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_ms_streaming_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ms_streaming_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ms_streaming_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the ms_streaming port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_ms_streaming_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ms_streaming_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ms_streaming_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the ms_streaming port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_ms_streaming_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ms_streaming_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ms_streaming_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the ms_streaming port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_ms_streaming_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ms_streaming_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ms_streaming_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the ms_streaming port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_ms_streaming_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ms_streaming_port'($*)) dnl
-
- gen_require(`
- type ms_streaming_port_t;
- ')
-
- allow $1 ms_streaming_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ms_streaming_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the ms_streaming port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_ms_streaming_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ms_streaming_port'($*)) dnl
-
- gen_require(`
- type ms_streaming_port_t;
- ')
-
- allow $1 ms_streaming_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ms_streaming_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the ms_streaming port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_ms_streaming_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ms_streaming_port'($*)) dnl
-
- gen_require(`
- type ms_streaming_port_t;
- ')
-
- allow $1 ms_streaming_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ms_streaming_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ms_streaming_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ms_streaming_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ms_streaming_client_packets'($*)) dnl
-
- gen_require(`
- type ms_streaming_client_packet_t;
- ')
-
- allow $1 ms_streaming_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ms_streaming_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ms_streaming_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ms_streaming_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ms_streaming_client_packets'($*)) dnl
-
- gen_require(`
- type ms_streaming_client_packet_t;
- ')
-
- dontaudit $1 ms_streaming_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ms_streaming_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ms_streaming_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ms_streaming_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ms_streaming_client_packets'($*)) dnl
-
- gen_require(`
- type ms_streaming_client_packet_t;
- ')
-
- allow $1 ms_streaming_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ms_streaming_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ms_streaming_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ms_streaming_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ms_streaming_client_packets'($*)) dnl
-
- gen_require(`
- type ms_streaming_client_packet_t;
- ')
-
- dontaudit $1 ms_streaming_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ms_streaming_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ms_streaming_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ms_streaming_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ms_streaming_client_packets'($*)) dnl
-
- corenet_send_ms_streaming_client_packets($1)
- corenet_receive_ms_streaming_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ms_streaming_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ms_streaming_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ms_streaming_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ms_streaming_client_packets'($*)) dnl
-
- corenet_dontaudit_send_ms_streaming_client_packets($1)
- corenet_dontaudit_receive_ms_streaming_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ms_streaming_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ms_streaming_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ms_streaming_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ms_streaming_client_packets'($*)) dnl
-
- gen_require(`
- type ms_streaming_client_packet_t;
- ')
-
- allow $1 ms_streaming_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ms_streaming_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ms_streaming_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ms_streaming_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ms_streaming_server_packets'($*)) dnl
-
- gen_require(`
- type ms_streaming_server_packet_t;
- ')
-
- allow $1 ms_streaming_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ms_streaming_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ms_streaming_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ms_streaming_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ms_streaming_server_packets'($*)) dnl
-
- gen_require(`
- type ms_streaming_server_packet_t;
- ')
-
- dontaudit $1 ms_streaming_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ms_streaming_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ms_streaming_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ms_streaming_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ms_streaming_server_packets'($*)) dnl
-
- gen_require(`
- type ms_streaming_server_packet_t;
- ')
-
- allow $1 ms_streaming_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ms_streaming_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ms_streaming_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ms_streaming_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ms_streaming_server_packets'($*)) dnl
-
- gen_require(`
- type ms_streaming_server_packet_t;
- ')
-
- dontaudit $1 ms_streaming_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ms_streaming_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ms_streaming_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ms_streaming_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ms_streaming_server_packets'($*)) dnl
-
- corenet_send_ms_streaming_server_packets($1)
- corenet_receive_ms_streaming_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ms_streaming_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ms_streaming_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ms_streaming_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ms_streaming_server_packets'($*)) dnl
-
- corenet_dontaudit_send_ms_streaming_server_packets($1)
- corenet_dontaudit_receive_ms_streaming_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ms_streaming_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ms_streaming_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ms_streaming_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ms_streaming_server_packets'($*)) dnl
-
- gen_require(`
- type ms_streaming_server_packet_t;
- ')
-
- allow $1 ms_streaming_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ms_streaming_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the munin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_munin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_munin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_munin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the munin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_munin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_munin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_munin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the munin port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_munin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_munin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_munin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the munin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_munin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_munin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_munin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the munin port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_munin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_munin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_munin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the munin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_munin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_munin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_munin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the munin port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_munin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_munin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_munin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the munin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_munin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_munin_port'($*)) dnl
-
- gen_require(`
- type munin_port_t;
- ')
-
- allow $1 munin_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_munin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the munin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_munin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_munin_port'($*)) dnl
-
- gen_require(`
- type munin_port_t;
- ')
-
- allow $1 munin_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_munin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the munin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_munin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_munin_port'($*)) dnl
-
- gen_require(`
- type munin_port_t;
- ')
-
- allow $1 munin_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_munin_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send munin_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_munin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_munin_client_packets'($*)) dnl
-
- gen_require(`
- type munin_client_packet_t;
- ')
-
- allow $1 munin_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_munin_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send munin_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_munin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_munin_client_packets'($*)) dnl
-
- gen_require(`
- type munin_client_packet_t;
- ')
-
- dontaudit $1 munin_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_munin_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive munin_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_munin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_munin_client_packets'($*)) dnl
-
- gen_require(`
- type munin_client_packet_t;
- ')
-
- allow $1 munin_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_munin_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive munin_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_munin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_munin_client_packets'($*)) dnl
-
- gen_require(`
- type munin_client_packet_t;
- ')
-
- dontaudit $1 munin_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_munin_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive munin_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_munin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_munin_client_packets'($*)) dnl
-
- corenet_send_munin_client_packets($1)
- corenet_receive_munin_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_munin_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive munin_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_munin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_munin_client_packets'($*)) dnl
-
- corenet_dontaudit_send_munin_client_packets($1)
- corenet_dontaudit_receive_munin_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_munin_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to munin_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_munin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_munin_client_packets'($*)) dnl
-
- gen_require(`
- type munin_client_packet_t;
- ')
-
- allow $1 munin_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_munin_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send munin_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_munin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_munin_server_packets'($*)) dnl
-
- gen_require(`
- type munin_server_packet_t;
- ')
-
- allow $1 munin_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_munin_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send munin_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_munin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_munin_server_packets'($*)) dnl
-
- gen_require(`
- type munin_server_packet_t;
- ')
-
- dontaudit $1 munin_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_munin_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive munin_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_munin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_munin_server_packets'($*)) dnl
-
- gen_require(`
- type munin_server_packet_t;
- ')
-
- allow $1 munin_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_munin_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive munin_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_munin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_munin_server_packets'($*)) dnl
-
- gen_require(`
- type munin_server_packet_t;
- ')
-
- dontaudit $1 munin_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_munin_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive munin_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_munin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_munin_server_packets'($*)) dnl
-
- corenet_send_munin_server_packets($1)
- corenet_receive_munin_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_munin_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive munin_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_munin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_munin_server_packets'($*)) dnl
-
- corenet_dontaudit_send_munin_server_packets($1)
- corenet_dontaudit_receive_munin_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_munin_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to munin_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_munin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_munin_server_packets'($*)) dnl
-
- gen_require(`
- type munin_server_packet_t;
- ')
-
- allow $1 munin_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_munin_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the mxi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_mxi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_mxi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_mxi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the mxi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_mxi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_mxi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_mxi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the mxi port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_mxi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_mxi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_mxi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the mxi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_mxi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_mxi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_mxi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the mxi port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_mxi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_mxi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_mxi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the mxi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_mxi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_mxi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_mxi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the mxi port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_mxi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_mxi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_mxi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the mxi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_mxi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_mxi_port'($*)) dnl
-
- gen_require(`
- type mxi_port_t;
- ')
-
- allow $1 mxi_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_mxi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the mxi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_mxi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_mxi_port'($*)) dnl
-
- gen_require(`
- type mxi_port_t;
- ')
-
- allow $1 mxi_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_mxi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the mxi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_mxi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_mxi_port'($*)) dnl
-
- gen_require(`
- type mxi_port_t;
- ')
-
- allow $1 mxi_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_mxi_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send mxi_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_mxi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_mxi_client_packets'($*)) dnl
-
- gen_require(`
- type mxi_client_packet_t;
- ')
-
- allow $1 mxi_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_mxi_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send mxi_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_mxi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mxi_client_packets'($*)) dnl
-
- gen_require(`
- type mxi_client_packet_t;
- ')
-
- dontaudit $1 mxi_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mxi_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive mxi_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_mxi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_mxi_client_packets'($*)) dnl
-
- gen_require(`
- type mxi_client_packet_t;
- ')
-
- allow $1 mxi_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_mxi_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive mxi_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_mxi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mxi_client_packets'($*)) dnl
-
- gen_require(`
- type mxi_client_packet_t;
- ')
-
- dontaudit $1 mxi_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mxi_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive mxi_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_mxi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mxi_client_packets'($*)) dnl
-
- corenet_send_mxi_client_packets($1)
- corenet_receive_mxi_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mxi_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive mxi_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_mxi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mxi_client_packets'($*)) dnl
-
- corenet_dontaudit_send_mxi_client_packets($1)
- corenet_dontaudit_receive_mxi_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mxi_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to mxi_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_mxi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mxi_client_packets'($*)) dnl
-
- gen_require(`
- type mxi_client_packet_t;
- ')
-
- allow $1 mxi_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_mxi_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send mxi_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_mxi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_mxi_server_packets'($*)) dnl
-
- gen_require(`
- type mxi_server_packet_t;
- ')
-
- allow $1 mxi_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_mxi_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send mxi_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_mxi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mxi_server_packets'($*)) dnl
-
- gen_require(`
- type mxi_server_packet_t;
- ')
-
- dontaudit $1 mxi_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mxi_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive mxi_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_mxi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_mxi_server_packets'($*)) dnl
-
- gen_require(`
- type mxi_server_packet_t;
- ')
-
- allow $1 mxi_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_mxi_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive mxi_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_mxi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mxi_server_packets'($*)) dnl
-
- gen_require(`
- type mxi_server_packet_t;
- ')
-
- dontaudit $1 mxi_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mxi_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive mxi_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_mxi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mxi_server_packets'($*)) dnl
-
- corenet_send_mxi_server_packets($1)
- corenet_receive_mxi_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mxi_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive mxi_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_mxi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mxi_server_packets'($*)) dnl
-
- corenet_dontaudit_send_mxi_server_packets($1)
- corenet_dontaudit_receive_mxi_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mxi_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to mxi_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_mxi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mxi_server_packets'($*)) dnl
-
- gen_require(`
- type mxi_server_packet_t;
- ')
-
- allow $1 mxi_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_mxi_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the mysqld port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_mysqld_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_mysqld_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_mysqld_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the mysqld port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_mysqld_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_mysqld_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_mysqld_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the mysqld port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_mysqld_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_mysqld_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_mysqld_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the mysqld port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_mysqld_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_mysqld_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_mysqld_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the mysqld port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_mysqld_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_mysqld_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_mysqld_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the mysqld port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_mysqld_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_mysqld_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_mysqld_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the mysqld port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_mysqld_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_mysqld_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_mysqld_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the mysqld port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_mysqld_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_mysqld_port'($*)) dnl
-
- gen_require(`
- type mysqld_port_t;
- ')
-
- allow $1 mysqld_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_mysqld_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the mysqld port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_mysqld_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_mysqld_port'($*)) dnl
-
- gen_require(`
- type mysqld_port_t;
- ')
-
- allow $1 mysqld_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_mysqld_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the mysqld port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_mysqld_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_mysqld_port'($*)) dnl
-
- gen_require(`
- type mysqld_port_t;
- ')
-
- allow $1 mysqld_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_mysqld_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send mysqld_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_mysqld_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_mysqld_client_packets'($*)) dnl
-
- gen_require(`
- type mysqld_client_packet_t;
- ')
-
- allow $1 mysqld_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_mysqld_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send mysqld_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_mysqld_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mysqld_client_packets'($*)) dnl
-
- gen_require(`
- type mysqld_client_packet_t;
- ')
-
- dontaudit $1 mysqld_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mysqld_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive mysqld_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_mysqld_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_mysqld_client_packets'($*)) dnl
-
- gen_require(`
- type mysqld_client_packet_t;
- ')
-
- allow $1 mysqld_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_mysqld_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive mysqld_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_mysqld_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mysqld_client_packets'($*)) dnl
-
- gen_require(`
- type mysqld_client_packet_t;
- ')
-
- dontaudit $1 mysqld_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mysqld_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive mysqld_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_mysqld_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mysqld_client_packets'($*)) dnl
-
- corenet_send_mysqld_client_packets($1)
- corenet_receive_mysqld_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mysqld_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive mysqld_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_mysqld_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mysqld_client_packets'($*)) dnl
-
- corenet_dontaudit_send_mysqld_client_packets($1)
- corenet_dontaudit_receive_mysqld_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mysqld_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to mysqld_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_mysqld_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mysqld_client_packets'($*)) dnl
-
- gen_require(`
- type mysqld_client_packet_t;
- ')
-
- allow $1 mysqld_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_mysqld_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send mysqld_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_mysqld_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_mysqld_server_packets'($*)) dnl
-
- gen_require(`
- type mysqld_server_packet_t;
- ')
-
- allow $1 mysqld_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_mysqld_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send mysqld_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_mysqld_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mysqld_server_packets'($*)) dnl
-
- gen_require(`
- type mysqld_server_packet_t;
- ')
-
- dontaudit $1 mysqld_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mysqld_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive mysqld_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_mysqld_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_mysqld_server_packets'($*)) dnl
-
- gen_require(`
- type mysqld_server_packet_t;
- ')
-
- allow $1 mysqld_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_mysqld_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive mysqld_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_mysqld_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mysqld_server_packets'($*)) dnl
-
- gen_require(`
- type mysqld_server_packet_t;
- ')
-
- dontaudit $1 mysqld_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mysqld_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive mysqld_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_mysqld_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mysqld_server_packets'($*)) dnl
-
- corenet_send_mysqld_server_packets($1)
- corenet_receive_mysqld_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mysqld_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive mysqld_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_mysqld_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mysqld_server_packets'($*)) dnl
-
- corenet_dontaudit_send_mysqld_server_packets($1)
- corenet_dontaudit_receive_mysqld_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mysqld_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to mysqld_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_mysqld_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mysqld_server_packets'($*)) dnl
-
- gen_require(`
- type mysqld_server_packet_t;
- ')
-
- allow $1 mysqld_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_mysqld_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the mysqlmanagerd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_mysqlmanagerd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_mysqlmanagerd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_mysqlmanagerd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the mysqlmanagerd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_mysqlmanagerd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_mysqlmanagerd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_mysqlmanagerd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the mysqlmanagerd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_mysqlmanagerd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_mysqlmanagerd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_mysqlmanagerd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the mysqlmanagerd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_mysqlmanagerd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_mysqlmanagerd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_mysqlmanagerd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the mysqlmanagerd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_mysqlmanagerd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_mysqlmanagerd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_mysqlmanagerd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the mysqlmanagerd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_mysqlmanagerd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_mysqlmanagerd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_mysqlmanagerd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the mysqlmanagerd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the mysqlmanagerd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_mysqlmanagerd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_mysqlmanagerd_port'($*)) dnl
-
- gen_require(`
- type mysqlmanagerd_port_t;
- ')
-
- allow $1 mysqlmanagerd_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_mysqlmanagerd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the mysqlmanagerd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_mysqlmanagerd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_mysqlmanagerd_port'($*)) dnl
-
- gen_require(`
- type mysqlmanagerd_port_t;
- ')
-
- allow $1 mysqlmanagerd_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_mysqlmanagerd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the mysqlmanagerd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_mysqlmanagerd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_mysqlmanagerd_port'($*)) dnl
-
- gen_require(`
- type mysqlmanagerd_port_t;
- ')
-
- allow $1 mysqlmanagerd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_mysqlmanagerd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send mysqlmanagerd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_mysqlmanagerd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_mysqlmanagerd_client_packets'($*)) dnl
-
- gen_require(`
- type mysqlmanagerd_client_packet_t;
- ')
-
- allow $1 mysqlmanagerd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_mysqlmanagerd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send mysqlmanagerd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_mysqlmanagerd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mysqlmanagerd_client_packets'($*)) dnl
-
- gen_require(`
- type mysqlmanagerd_client_packet_t;
- ')
-
- dontaudit $1 mysqlmanagerd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mysqlmanagerd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive mysqlmanagerd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_mysqlmanagerd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_mysqlmanagerd_client_packets'($*)) dnl
-
- gen_require(`
- type mysqlmanagerd_client_packet_t;
- ')
-
- allow $1 mysqlmanagerd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_mysqlmanagerd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive mysqlmanagerd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_mysqlmanagerd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mysqlmanagerd_client_packets'($*)) dnl
-
- gen_require(`
- type mysqlmanagerd_client_packet_t;
- ')
-
- dontaudit $1 mysqlmanagerd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mysqlmanagerd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive mysqlmanagerd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_mysqlmanagerd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mysqlmanagerd_client_packets'($*)) dnl
-
- corenet_send_mysqlmanagerd_client_packets($1)
- corenet_receive_mysqlmanagerd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mysqlmanagerd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive mysqlmanagerd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_mysqlmanagerd_client_packets($1)
- corenet_dontaudit_receive_mysqlmanagerd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to mysqlmanagerd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_mysqlmanagerd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mysqlmanagerd_client_packets'($*)) dnl
-
- gen_require(`
- type mysqlmanagerd_client_packet_t;
- ')
-
- allow $1 mysqlmanagerd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_mysqlmanagerd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send mysqlmanagerd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_mysqlmanagerd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_mysqlmanagerd_server_packets'($*)) dnl
-
- gen_require(`
- type mysqlmanagerd_server_packet_t;
- ')
-
- allow $1 mysqlmanagerd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_mysqlmanagerd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send mysqlmanagerd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_mysqlmanagerd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mysqlmanagerd_server_packets'($*)) dnl
-
- gen_require(`
- type mysqlmanagerd_server_packet_t;
- ')
-
- dontaudit $1 mysqlmanagerd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mysqlmanagerd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive mysqlmanagerd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_mysqlmanagerd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_mysqlmanagerd_server_packets'($*)) dnl
-
- gen_require(`
- type mysqlmanagerd_server_packet_t;
- ')
-
- allow $1 mysqlmanagerd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_mysqlmanagerd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive mysqlmanagerd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_mysqlmanagerd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mysqlmanagerd_server_packets'($*)) dnl
-
- gen_require(`
- type mysqlmanagerd_server_packet_t;
- ')
-
- dontaudit $1 mysqlmanagerd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mysqlmanagerd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive mysqlmanagerd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_mysqlmanagerd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mysqlmanagerd_server_packets'($*)) dnl
-
- corenet_send_mysqlmanagerd_server_packets($1)
- corenet_receive_mysqlmanagerd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mysqlmanagerd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive mysqlmanagerd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_mysqlmanagerd_server_packets($1)
- corenet_dontaudit_receive_mysqlmanagerd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to mysqlmanagerd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_mysqlmanagerd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mysqlmanagerd_server_packets'($*)) dnl
-
- gen_require(`
- type mysqlmanagerd_server_packet_t;
- ')
-
- allow $1 mysqlmanagerd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_mysqlmanagerd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the nessus port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_nessus_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_nessus_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_nessus_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the nessus port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_nessus_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_nessus_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_nessus_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the nessus port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_nessus_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_nessus_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_nessus_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the nessus port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_nessus_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_nessus_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_nessus_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the nessus port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_nessus_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_nessus_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_nessus_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the nessus port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_nessus_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_nessus_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_nessus_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the nessus port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_nessus_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_nessus_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_nessus_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the nessus port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_nessus_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_nessus_port'($*)) dnl
-
- gen_require(`
- type nessus_port_t;
- ')
-
- allow $1 nessus_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_nessus_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the nessus port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_nessus_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_nessus_port'($*)) dnl
-
- gen_require(`
- type nessus_port_t;
- ')
-
- allow $1 nessus_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_nessus_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the nessus port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_nessus_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_nessus_port'($*)) dnl
-
- gen_require(`
- type nessus_port_t;
- ')
-
- allow $1 nessus_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_nessus_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send nessus_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_nessus_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_nessus_client_packets'($*)) dnl
-
- gen_require(`
- type nessus_client_packet_t;
- ')
-
- allow $1 nessus_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_nessus_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send nessus_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_nessus_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_nessus_client_packets'($*)) dnl
-
- gen_require(`
- type nessus_client_packet_t;
- ')
-
- dontaudit $1 nessus_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_nessus_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive nessus_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_nessus_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_nessus_client_packets'($*)) dnl
-
- gen_require(`
- type nessus_client_packet_t;
- ')
-
- allow $1 nessus_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_nessus_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive nessus_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_nessus_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_nessus_client_packets'($*)) dnl
-
- gen_require(`
- type nessus_client_packet_t;
- ')
-
- dontaudit $1 nessus_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_nessus_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive nessus_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_nessus_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_nessus_client_packets'($*)) dnl
-
- corenet_send_nessus_client_packets($1)
- corenet_receive_nessus_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_nessus_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive nessus_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_nessus_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_nessus_client_packets'($*)) dnl
-
- corenet_dontaudit_send_nessus_client_packets($1)
- corenet_dontaudit_receive_nessus_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_nessus_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to nessus_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_nessus_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_nessus_client_packets'($*)) dnl
-
- gen_require(`
- type nessus_client_packet_t;
- ')
-
- allow $1 nessus_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_nessus_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send nessus_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_nessus_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_nessus_server_packets'($*)) dnl
-
- gen_require(`
- type nessus_server_packet_t;
- ')
-
- allow $1 nessus_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_nessus_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send nessus_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_nessus_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_nessus_server_packets'($*)) dnl
-
- gen_require(`
- type nessus_server_packet_t;
- ')
-
- dontaudit $1 nessus_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_nessus_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive nessus_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_nessus_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_nessus_server_packets'($*)) dnl
-
- gen_require(`
- type nessus_server_packet_t;
- ')
-
- allow $1 nessus_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_nessus_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive nessus_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_nessus_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_nessus_server_packets'($*)) dnl
-
- gen_require(`
- type nessus_server_packet_t;
- ')
-
- dontaudit $1 nessus_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_nessus_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive nessus_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_nessus_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_nessus_server_packets'($*)) dnl
-
- corenet_send_nessus_server_packets($1)
- corenet_receive_nessus_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_nessus_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive nessus_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_nessus_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_nessus_server_packets'($*)) dnl
-
- corenet_dontaudit_send_nessus_server_packets($1)
- corenet_dontaudit_receive_nessus_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_nessus_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to nessus_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_nessus_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_nessus_server_packets'($*)) dnl
-
- gen_require(`
- type nessus_server_packet_t;
- ')
-
- allow $1 nessus_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_nessus_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the netport port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_netport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_netport_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_netport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the netport port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_netport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_netport_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_netport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the netport port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_netport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_netport_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_netport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the netport port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_netport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_netport_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_netport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the netport port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_netport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_netport_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_netport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the netport port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_netport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_netport_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_netport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the netport port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_netport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_netport_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_netport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the netport port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_netport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_netport_port'($*)) dnl
-
- gen_require(`
- type netport_port_t;
- ')
-
- allow $1 netport_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_netport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the netport port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_netport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_netport_port'($*)) dnl
-
- gen_require(`
- type netport_port_t;
- ')
-
- allow $1 netport_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_netport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the netport port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_netport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_netport_port'($*)) dnl
-
- gen_require(`
- type netport_port_t;
- ')
-
- allow $1 netport_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_netport_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send netport_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_netport_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_netport_client_packets'($*)) dnl
-
- gen_require(`
- type netport_client_packet_t;
- ')
-
- allow $1 netport_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_netport_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send netport_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_netport_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_netport_client_packets'($*)) dnl
-
- gen_require(`
- type netport_client_packet_t;
- ')
-
- dontaudit $1 netport_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_netport_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive netport_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_netport_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_netport_client_packets'($*)) dnl
-
- gen_require(`
- type netport_client_packet_t;
- ')
-
- allow $1 netport_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_netport_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive netport_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_netport_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_netport_client_packets'($*)) dnl
-
- gen_require(`
- type netport_client_packet_t;
- ')
-
- dontaudit $1 netport_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_netport_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive netport_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_netport_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_netport_client_packets'($*)) dnl
-
- corenet_send_netport_client_packets($1)
- corenet_receive_netport_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_netport_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive netport_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_netport_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_netport_client_packets'($*)) dnl
-
- corenet_dontaudit_send_netport_client_packets($1)
- corenet_dontaudit_receive_netport_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_netport_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to netport_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_netport_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_netport_client_packets'($*)) dnl
-
- gen_require(`
- type netport_client_packet_t;
- ')
-
- allow $1 netport_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_netport_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send netport_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_netport_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_netport_server_packets'($*)) dnl
-
- gen_require(`
- type netport_server_packet_t;
- ')
-
- allow $1 netport_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_netport_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send netport_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_netport_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_netport_server_packets'($*)) dnl
-
- gen_require(`
- type netport_server_packet_t;
- ')
-
- dontaudit $1 netport_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_netport_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive netport_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_netport_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_netport_server_packets'($*)) dnl
-
- gen_require(`
- type netport_server_packet_t;
- ')
-
- allow $1 netport_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_netport_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive netport_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_netport_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_netport_server_packets'($*)) dnl
-
- gen_require(`
- type netport_server_packet_t;
- ')
-
- dontaudit $1 netport_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_netport_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive netport_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_netport_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_netport_server_packets'($*)) dnl
-
- corenet_send_netport_server_packets($1)
- corenet_receive_netport_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_netport_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive netport_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_netport_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_netport_server_packets'($*)) dnl
-
- corenet_dontaudit_send_netport_server_packets($1)
- corenet_dontaudit_receive_netport_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_netport_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to netport_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_netport_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_netport_server_packets'($*)) dnl
-
- gen_require(`
- type netport_server_packet_t;
- ')
-
- allow $1 netport_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_netport_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the netsupport port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_netsupport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_netsupport_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_netsupport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the netsupport port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_netsupport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_netsupport_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_netsupport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the netsupport port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_netsupport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_netsupport_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_netsupport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the netsupport port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_netsupport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_netsupport_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_netsupport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the netsupport port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_netsupport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_netsupport_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_netsupport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the netsupport port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_netsupport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_netsupport_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_netsupport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the netsupport port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_netsupport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_netsupport_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_netsupport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the netsupport port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_netsupport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_netsupport_port'($*)) dnl
-
- gen_require(`
- type netsupport_port_t;
- ')
-
- allow $1 netsupport_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_netsupport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the netsupport port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_netsupport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_netsupport_port'($*)) dnl
-
- gen_require(`
- type netsupport_port_t;
- ')
-
- allow $1 netsupport_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_netsupport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the netsupport port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_netsupport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_netsupport_port'($*)) dnl
-
- gen_require(`
- type netsupport_port_t;
- ')
-
- allow $1 netsupport_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_netsupport_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send netsupport_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_netsupport_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_netsupport_client_packets'($*)) dnl
-
- gen_require(`
- type netsupport_client_packet_t;
- ')
-
- allow $1 netsupport_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_netsupport_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send netsupport_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_netsupport_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_netsupport_client_packets'($*)) dnl
-
- gen_require(`
- type netsupport_client_packet_t;
- ')
-
- dontaudit $1 netsupport_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_netsupport_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive netsupport_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_netsupport_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_netsupport_client_packets'($*)) dnl
-
- gen_require(`
- type netsupport_client_packet_t;
- ')
-
- allow $1 netsupport_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_netsupport_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive netsupport_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_netsupport_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_netsupport_client_packets'($*)) dnl
-
- gen_require(`
- type netsupport_client_packet_t;
- ')
-
- dontaudit $1 netsupport_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_netsupport_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive netsupport_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_netsupport_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_netsupport_client_packets'($*)) dnl
-
- corenet_send_netsupport_client_packets($1)
- corenet_receive_netsupport_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_netsupport_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive netsupport_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_netsupport_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_netsupport_client_packets'($*)) dnl
-
- corenet_dontaudit_send_netsupport_client_packets($1)
- corenet_dontaudit_receive_netsupport_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_netsupport_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to netsupport_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_netsupport_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_netsupport_client_packets'($*)) dnl
-
- gen_require(`
- type netsupport_client_packet_t;
- ')
-
- allow $1 netsupport_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_netsupport_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send netsupport_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_netsupport_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_netsupport_server_packets'($*)) dnl
-
- gen_require(`
- type netsupport_server_packet_t;
- ')
-
- allow $1 netsupport_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_netsupport_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send netsupport_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_netsupport_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_netsupport_server_packets'($*)) dnl
-
- gen_require(`
- type netsupport_server_packet_t;
- ')
-
- dontaudit $1 netsupport_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_netsupport_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive netsupport_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_netsupport_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_netsupport_server_packets'($*)) dnl
-
- gen_require(`
- type netsupport_server_packet_t;
- ')
-
- allow $1 netsupport_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_netsupport_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive netsupport_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_netsupport_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_netsupport_server_packets'($*)) dnl
-
- gen_require(`
- type netsupport_server_packet_t;
- ')
-
- dontaudit $1 netsupport_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_netsupport_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive netsupport_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_netsupport_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_netsupport_server_packets'($*)) dnl
-
- corenet_send_netsupport_server_packets($1)
- corenet_receive_netsupport_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_netsupport_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive netsupport_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_netsupport_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_netsupport_server_packets'($*)) dnl
-
- corenet_dontaudit_send_netsupport_server_packets($1)
- corenet_dontaudit_receive_netsupport_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_netsupport_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to netsupport_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_netsupport_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_netsupport_server_packets'($*)) dnl
-
- gen_require(`
- type netsupport_server_packet_t;
- ')
-
- allow $1 netsupport_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_netsupport_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the nfs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_nfs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_nfs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_nfs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the nfs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_nfs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_nfs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_nfs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the nfs port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_nfs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_nfs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_nfs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the nfs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_nfs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_nfs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_nfs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the nfs port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_nfs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_nfs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_nfs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the nfs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_nfs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_nfs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_nfs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the nfs port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_nfs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_nfs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_nfs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the nfs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_nfs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_nfs_port'($*)) dnl
-
- gen_require(`
- type nfs_port_t;
- ')
-
- allow $1 nfs_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_nfs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the nfs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_nfs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_nfs_port'($*)) dnl
-
- gen_require(`
- type nfs_port_t;
- ')
-
- allow $1 nfs_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_nfs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the nfs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_nfs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_nfs_port'($*)) dnl
-
- gen_require(`
- type nfs_port_t;
- ')
-
- allow $1 nfs_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_nfs_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send nfs_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_nfs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_nfs_client_packets'($*)) dnl
-
- gen_require(`
- type nfs_client_packet_t;
- ')
-
- allow $1 nfs_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_nfs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send nfs_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_nfs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_nfs_client_packets'($*)) dnl
-
- gen_require(`
- type nfs_client_packet_t;
- ')
-
- dontaudit $1 nfs_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_nfs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive nfs_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_nfs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_nfs_client_packets'($*)) dnl
-
- gen_require(`
- type nfs_client_packet_t;
- ')
-
- allow $1 nfs_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_nfs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive nfs_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_nfs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_nfs_client_packets'($*)) dnl
-
- gen_require(`
- type nfs_client_packet_t;
- ')
-
- dontaudit $1 nfs_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_nfs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive nfs_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_nfs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_nfs_client_packets'($*)) dnl
-
- corenet_send_nfs_client_packets($1)
- corenet_receive_nfs_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_nfs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive nfs_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_nfs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_nfs_client_packets'($*)) dnl
-
- corenet_dontaudit_send_nfs_client_packets($1)
- corenet_dontaudit_receive_nfs_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_nfs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to nfs_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_nfs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_nfs_client_packets'($*)) dnl
-
- gen_require(`
- type nfs_client_packet_t;
- ')
-
- allow $1 nfs_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_nfs_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send nfs_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_nfs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_nfs_server_packets'($*)) dnl
-
- gen_require(`
- type nfs_server_packet_t;
- ')
-
- allow $1 nfs_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_nfs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send nfs_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_nfs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_nfs_server_packets'($*)) dnl
-
- gen_require(`
- type nfs_server_packet_t;
- ')
-
- dontaudit $1 nfs_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_nfs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive nfs_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_nfs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_nfs_server_packets'($*)) dnl
-
- gen_require(`
- type nfs_server_packet_t;
- ')
-
- allow $1 nfs_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_nfs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive nfs_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_nfs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_nfs_server_packets'($*)) dnl
-
- gen_require(`
- type nfs_server_packet_t;
- ')
-
- dontaudit $1 nfs_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_nfs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive nfs_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_nfs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_nfs_server_packets'($*)) dnl
-
- corenet_send_nfs_server_packets($1)
- corenet_receive_nfs_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_nfs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive nfs_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_nfs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_nfs_server_packets'($*)) dnl
-
- corenet_dontaudit_send_nfs_server_packets($1)
- corenet_dontaudit_receive_nfs_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_nfs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to nfs_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_nfs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_nfs_server_packets'($*)) dnl
-
- gen_require(`
- type nfs_server_packet_t;
- ')
-
- allow $1 nfs_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_nfs_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the nfsrdma port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_nfsrdma_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_nfsrdma_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_nfsrdma_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the nfsrdma port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_nfsrdma_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_nfsrdma_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_nfsrdma_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the nfsrdma port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_nfsrdma_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_nfsrdma_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_nfsrdma_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the nfsrdma port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_nfsrdma_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_nfsrdma_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_nfsrdma_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the nfsrdma port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_nfsrdma_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_nfsrdma_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_nfsrdma_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the nfsrdma port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_nfsrdma_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_nfsrdma_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_nfsrdma_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the nfsrdma port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_nfsrdma_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_nfsrdma_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_nfsrdma_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the nfsrdma port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_nfsrdma_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_nfsrdma_port'($*)) dnl
-
- gen_require(`
- type nfsrdma_port_t;
- ')
-
- allow $1 nfsrdma_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_nfsrdma_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the nfsrdma port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_nfsrdma_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_nfsrdma_port'($*)) dnl
-
- gen_require(`
- type nfsrdma_port_t;
- ')
-
- allow $1 nfsrdma_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_nfsrdma_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the nfsrdma port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_nfsrdma_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_nfsrdma_port'($*)) dnl
-
- gen_require(`
- type nfsrdma_port_t;
- ')
-
- allow $1 nfsrdma_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_nfsrdma_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send nfsrdma_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_nfsrdma_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_nfsrdma_client_packets'($*)) dnl
-
- gen_require(`
- type nfsrdma_client_packet_t;
- ')
-
- allow $1 nfsrdma_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_nfsrdma_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send nfsrdma_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_nfsrdma_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_nfsrdma_client_packets'($*)) dnl
-
- gen_require(`
- type nfsrdma_client_packet_t;
- ')
-
- dontaudit $1 nfsrdma_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_nfsrdma_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive nfsrdma_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_nfsrdma_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_nfsrdma_client_packets'($*)) dnl
-
- gen_require(`
- type nfsrdma_client_packet_t;
- ')
-
- allow $1 nfsrdma_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_nfsrdma_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive nfsrdma_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_nfsrdma_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_nfsrdma_client_packets'($*)) dnl
-
- gen_require(`
- type nfsrdma_client_packet_t;
- ')
-
- dontaudit $1 nfsrdma_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_nfsrdma_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive nfsrdma_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_nfsrdma_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_nfsrdma_client_packets'($*)) dnl
-
- corenet_send_nfsrdma_client_packets($1)
- corenet_receive_nfsrdma_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_nfsrdma_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive nfsrdma_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_nfsrdma_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_nfsrdma_client_packets'($*)) dnl
-
- corenet_dontaudit_send_nfsrdma_client_packets($1)
- corenet_dontaudit_receive_nfsrdma_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_nfsrdma_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to nfsrdma_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_nfsrdma_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_nfsrdma_client_packets'($*)) dnl
-
- gen_require(`
- type nfsrdma_client_packet_t;
- ')
-
- allow $1 nfsrdma_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_nfsrdma_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send nfsrdma_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_nfsrdma_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_nfsrdma_server_packets'($*)) dnl
-
- gen_require(`
- type nfsrdma_server_packet_t;
- ')
-
- allow $1 nfsrdma_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_nfsrdma_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send nfsrdma_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_nfsrdma_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_nfsrdma_server_packets'($*)) dnl
-
- gen_require(`
- type nfsrdma_server_packet_t;
- ')
-
- dontaudit $1 nfsrdma_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_nfsrdma_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive nfsrdma_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_nfsrdma_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_nfsrdma_server_packets'($*)) dnl
-
- gen_require(`
- type nfsrdma_server_packet_t;
- ')
-
- allow $1 nfsrdma_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_nfsrdma_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive nfsrdma_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_nfsrdma_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_nfsrdma_server_packets'($*)) dnl
-
- gen_require(`
- type nfsrdma_server_packet_t;
- ')
-
- dontaudit $1 nfsrdma_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_nfsrdma_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive nfsrdma_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_nfsrdma_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_nfsrdma_server_packets'($*)) dnl
-
- corenet_send_nfsrdma_server_packets($1)
- corenet_receive_nfsrdma_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_nfsrdma_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive nfsrdma_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_nfsrdma_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_nfsrdma_server_packets'($*)) dnl
-
- corenet_dontaudit_send_nfsrdma_server_packets($1)
- corenet_dontaudit_receive_nfsrdma_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_nfsrdma_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to nfsrdma_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_nfsrdma_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_nfsrdma_server_packets'($*)) dnl
-
- gen_require(`
- type nfsrdma_server_packet_t;
- ')
-
- allow $1 nfsrdma_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_nfsrdma_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the nmbd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_nmbd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_nmbd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_nmbd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the nmbd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_nmbd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_nmbd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_nmbd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the nmbd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_nmbd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_nmbd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_nmbd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the nmbd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_nmbd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_nmbd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_nmbd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the nmbd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_nmbd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_nmbd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_nmbd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the nmbd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_nmbd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_nmbd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_nmbd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the nmbd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_nmbd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_nmbd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_nmbd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the nmbd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_nmbd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_nmbd_port'($*)) dnl
-
- gen_require(`
- type nmbd_port_t;
- ')
-
- allow $1 nmbd_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_nmbd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the nmbd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_nmbd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_nmbd_port'($*)) dnl
-
- gen_require(`
- type nmbd_port_t;
- ')
-
- allow $1 nmbd_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_nmbd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the nmbd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_nmbd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_nmbd_port'($*)) dnl
-
- gen_require(`
- type nmbd_port_t;
- ')
-
- allow $1 nmbd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_nmbd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send nmbd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_nmbd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_nmbd_client_packets'($*)) dnl
-
- gen_require(`
- type nmbd_client_packet_t;
- ')
-
- allow $1 nmbd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_nmbd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send nmbd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_nmbd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_nmbd_client_packets'($*)) dnl
-
- gen_require(`
- type nmbd_client_packet_t;
- ')
-
- dontaudit $1 nmbd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_nmbd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive nmbd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_nmbd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_nmbd_client_packets'($*)) dnl
-
- gen_require(`
- type nmbd_client_packet_t;
- ')
-
- allow $1 nmbd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_nmbd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive nmbd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_nmbd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_nmbd_client_packets'($*)) dnl
-
- gen_require(`
- type nmbd_client_packet_t;
- ')
-
- dontaudit $1 nmbd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_nmbd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive nmbd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_nmbd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_nmbd_client_packets'($*)) dnl
-
- corenet_send_nmbd_client_packets($1)
- corenet_receive_nmbd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_nmbd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive nmbd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_nmbd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_nmbd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_nmbd_client_packets($1)
- corenet_dontaudit_receive_nmbd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_nmbd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to nmbd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_nmbd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_nmbd_client_packets'($*)) dnl
-
- gen_require(`
- type nmbd_client_packet_t;
- ')
-
- allow $1 nmbd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_nmbd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send nmbd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_nmbd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_nmbd_server_packets'($*)) dnl
-
- gen_require(`
- type nmbd_server_packet_t;
- ')
-
- allow $1 nmbd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_nmbd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send nmbd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_nmbd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_nmbd_server_packets'($*)) dnl
-
- gen_require(`
- type nmbd_server_packet_t;
- ')
-
- dontaudit $1 nmbd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_nmbd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive nmbd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_nmbd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_nmbd_server_packets'($*)) dnl
-
- gen_require(`
- type nmbd_server_packet_t;
- ')
-
- allow $1 nmbd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_nmbd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive nmbd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_nmbd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_nmbd_server_packets'($*)) dnl
-
- gen_require(`
- type nmbd_server_packet_t;
- ')
-
- dontaudit $1 nmbd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_nmbd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive nmbd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_nmbd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_nmbd_server_packets'($*)) dnl
-
- corenet_send_nmbd_server_packets($1)
- corenet_receive_nmbd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_nmbd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive nmbd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_nmbd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_nmbd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_nmbd_server_packets($1)
- corenet_dontaudit_receive_nmbd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_nmbd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to nmbd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_nmbd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_nmbd_server_packets'($*)) dnl
-
- gen_require(`
- type nmbd_server_packet_t;
- ')
-
- allow $1 nmbd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_nmbd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the ntop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_ntop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ntop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ntop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the ntop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_ntop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ntop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_ntop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the ntop port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_ntop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ntop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ntop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the ntop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_ntop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ntop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ntop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the ntop port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_ntop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ntop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ntop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the ntop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_ntop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ntop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ntop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the ntop port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_ntop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ntop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ntop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the ntop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_ntop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ntop_port'($*)) dnl
-
- gen_require(`
- type ntop_port_t;
- ')
-
- allow $1 ntop_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ntop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the ntop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_ntop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ntop_port'($*)) dnl
-
- gen_require(`
- type ntop_port_t;
- ')
-
- allow $1 ntop_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ntop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the ntop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_ntop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ntop_port'($*)) dnl
-
- gen_require(`
- type ntop_port_t;
- ')
-
- allow $1 ntop_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ntop_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ntop_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ntop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ntop_client_packets'($*)) dnl
-
- gen_require(`
- type ntop_client_packet_t;
- ')
-
- allow $1 ntop_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ntop_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ntop_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ntop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ntop_client_packets'($*)) dnl
-
- gen_require(`
- type ntop_client_packet_t;
- ')
-
- dontaudit $1 ntop_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ntop_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ntop_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ntop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ntop_client_packets'($*)) dnl
-
- gen_require(`
- type ntop_client_packet_t;
- ')
-
- allow $1 ntop_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ntop_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ntop_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ntop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ntop_client_packets'($*)) dnl
-
- gen_require(`
- type ntop_client_packet_t;
- ')
-
- dontaudit $1 ntop_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ntop_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ntop_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ntop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ntop_client_packets'($*)) dnl
-
- corenet_send_ntop_client_packets($1)
- corenet_receive_ntop_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ntop_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ntop_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ntop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ntop_client_packets'($*)) dnl
-
- corenet_dontaudit_send_ntop_client_packets($1)
- corenet_dontaudit_receive_ntop_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ntop_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ntop_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ntop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ntop_client_packets'($*)) dnl
-
- gen_require(`
- type ntop_client_packet_t;
- ')
-
- allow $1 ntop_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ntop_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ntop_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ntop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ntop_server_packets'($*)) dnl
-
- gen_require(`
- type ntop_server_packet_t;
- ')
-
- allow $1 ntop_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ntop_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ntop_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ntop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ntop_server_packets'($*)) dnl
-
- gen_require(`
- type ntop_server_packet_t;
- ')
-
- dontaudit $1 ntop_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ntop_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ntop_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ntop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ntop_server_packets'($*)) dnl
-
- gen_require(`
- type ntop_server_packet_t;
- ')
-
- allow $1 ntop_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ntop_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ntop_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ntop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ntop_server_packets'($*)) dnl
-
- gen_require(`
- type ntop_server_packet_t;
- ')
-
- dontaudit $1 ntop_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ntop_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ntop_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ntop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ntop_server_packets'($*)) dnl
-
- corenet_send_ntop_server_packets($1)
- corenet_receive_ntop_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ntop_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ntop_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ntop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ntop_server_packets'($*)) dnl
-
- corenet_dontaudit_send_ntop_server_packets($1)
- corenet_dontaudit_receive_ntop_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ntop_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ntop_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ntop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ntop_server_packets'($*)) dnl
-
- gen_require(`
- type ntop_server_packet_t;
- ')
-
- allow $1 ntop_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ntop_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the ntp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_ntp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ntp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ntp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the ntp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_ntp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ntp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_ntp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the ntp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_ntp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ntp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ntp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the ntp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_ntp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ntp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ntp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the ntp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_ntp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ntp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ntp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the ntp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_ntp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ntp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ntp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the ntp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_ntp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ntp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ntp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the ntp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_ntp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ntp_port'($*)) dnl
-
- gen_require(`
- type ntp_port_t;
- ')
-
- allow $1 ntp_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ntp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the ntp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_ntp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ntp_port'($*)) dnl
-
- gen_require(`
- type ntp_port_t;
- ')
-
- allow $1 ntp_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ntp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the ntp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_ntp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ntp_port'($*)) dnl
-
- gen_require(`
- type ntp_port_t;
- ')
-
- allow $1 ntp_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ntp_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ntp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ntp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ntp_client_packets'($*)) dnl
-
- gen_require(`
- type ntp_client_packet_t;
- ')
-
- allow $1 ntp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ntp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ntp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ntp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ntp_client_packets'($*)) dnl
-
- gen_require(`
- type ntp_client_packet_t;
- ')
-
- dontaudit $1 ntp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ntp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ntp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ntp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ntp_client_packets'($*)) dnl
-
- gen_require(`
- type ntp_client_packet_t;
- ')
-
- allow $1 ntp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ntp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ntp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ntp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ntp_client_packets'($*)) dnl
-
- gen_require(`
- type ntp_client_packet_t;
- ')
-
- dontaudit $1 ntp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ntp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ntp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ntp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ntp_client_packets'($*)) dnl
-
- corenet_send_ntp_client_packets($1)
- corenet_receive_ntp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ntp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ntp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ntp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ntp_client_packets'($*)) dnl
-
- corenet_dontaudit_send_ntp_client_packets($1)
- corenet_dontaudit_receive_ntp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ntp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ntp_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ntp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ntp_client_packets'($*)) dnl
-
- gen_require(`
- type ntp_client_packet_t;
- ')
-
- allow $1 ntp_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ntp_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ntp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ntp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ntp_server_packets'($*)) dnl
-
- gen_require(`
- type ntp_server_packet_t;
- ')
-
- allow $1 ntp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ntp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ntp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ntp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ntp_server_packets'($*)) dnl
-
- gen_require(`
- type ntp_server_packet_t;
- ')
-
- dontaudit $1 ntp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ntp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ntp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ntp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ntp_server_packets'($*)) dnl
-
- gen_require(`
- type ntp_server_packet_t;
- ')
-
- allow $1 ntp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ntp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ntp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ntp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ntp_server_packets'($*)) dnl
-
- gen_require(`
- type ntp_server_packet_t;
- ')
-
- dontaudit $1 ntp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ntp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ntp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ntp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ntp_server_packets'($*)) dnl
-
- corenet_send_ntp_server_packets($1)
- corenet_receive_ntp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ntp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ntp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ntp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ntp_server_packets'($*)) dnl
-
- corenet_dontaudit_send_ntp_server_packets($1)
- corenet_dontaudit_receive_ntp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ntp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ntp_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ntp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ntp_server_packets'($*)) dnl
-
- gen_require(`
- type ntp_server_packet_t;
- ')
-
- allow $1 ntp_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ntp_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the oa_system port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_oa_system_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_oa_system_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_oa_system_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the oa_system port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_oa_system_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_oa_system_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_oa_system_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the oa_system port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_oa_system_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_oa_system_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_oa_system_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the oa_system port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_oa_system_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_oa_system_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_oa_system_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the oa_system port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_oa_system_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_oa_system_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_oa_system_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the oa_system port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_oa_system_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_oa_system_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_oa_system_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the oa_system port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_oa_system_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_oa_system_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_oa_system_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the oa_system port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_oa_system_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_oa_system_port'($*)) dnl
-
- gen_require(`
- type oa_system_port_t;
- ')
-
- allow $1 oa_system_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_oa_system_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the oa_system port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_oa_system_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_oa_system_port'($*)) dnl
-
- gen_require(`
- type oa_system_port_t;
- ')
-
- allow $1 oa_system_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_oa_system_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the oa_system port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_oa_system_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_oa_system_port'($*)) dnl
-
- gen_require(`
- type oa_system_port_t;
- ')
-
- allow $1 oa_system_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_oa_system_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send oa_system_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_oa_system_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_oa_system_client_packets'($*)) dnl
-
- gen_require(`
- type oa_system_client_packet_t;
- ')
-
- allow $1 oa_system_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_oa_system_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send oa_system_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_oa_system_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_oa_system_client_packets'($*)) dnl
-
- gen_require(`
- type oa_system_client_packet_t;
- ')
-
- dontaudit $1 oa_system_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_oa_system_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive oa_system_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_oa_system_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_oa_system_client_packets'($*)) dnl
-
- gen_require(`
- type oa_system_client_packet_t;
- ')
-
- allow $1 oa_system_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_oa_system_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive oa_system_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_oa_system_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_oa_system_client_packets'($*)) dnl
-
- gen_require(`
- type oa_system_client_packet_t;
- ')
-
- dontaudit $1 oa_system_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_oa_system_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive oa_system_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_oa_system_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_oa_system_client_packets'($*)) dnl
-
- corenet_send_oa_system_client_packets($1)
- corenet_receive_oa_system_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_oa_system_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive oa_system_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_oa_system_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_oa_system_client_packets'($*)) dnl
-
- corenet_dontaudit_send_oa_system_client_packets($1)
- corenet_dontaudit_receive_oa_system_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_oa_system_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to oa_system_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_oa_system_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_oa_system_client_packets'($*)) dnl
-
- gen_require(`
- type oa_system_client_packet_t;
- ')
-
- allow $1 oa_system_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_oa_system_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send oa_system_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_oa_system_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_oa_system_server_packets'($*)) dnl
-
- gen_require(`
- type oa_system_server_packet_t;
- ')
-
- allow $1 oa_system_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_oa_system_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send oa_system_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_oa_system_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_oa_system_server_packets'($*)) dnl
-
- gen_require(`
- type oa_system_server_packet_t;
- ')
-
- dontaudit $1 oa_system_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_oa_system_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive oa_system_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_oa_system_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_oa_system_server_packets'($*)) dnl
-
- gen_require(`
- type oa_system_server_packet_t;
- ')
-
- allow $1 oa_system_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_oa_system_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive oa_system_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_oa_system_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_oa_system_server_packets'($*)) dnl
-
- gen_require(`
- type oa_system_server_packet_t;
- ')
-
- dontaudit $1 oa_system_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_oa_system_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive oa_system_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_oa_system_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_oa_system_server_packets'($*)) dnl
-
- corenet_send_oa_system_server_packets($1)
- corenet_receive_oa_system_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_oa_system_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive oa_system_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_oa_system_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_oa_system_server_packets'($*)) dnl
-
- corenet_dontaudit_send_oa_system_server_packets($1)
- corenet_dontaudit_receive_oa_system_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_oa_system_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to oa_system_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_oa_system_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_oa_system_server_packets'($*)) dnl
-
- gen_require(`
- type oa_system_server_packet_t;
- ')
-
- allow $1 oa_system_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_oa_system_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the oracledb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_oracledb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_oracledb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_oracledb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the oracledb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_oracledb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_oracledb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_oracledb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the oracledb port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_oracledb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_oracledb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_oracledb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the oracledb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_oracledb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_oracledb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_oracledb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the oracledb port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_oracledb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_oracledb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_oracledb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the oracledb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_oracledb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_oracledb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_oracledb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the oracledb port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_oracledb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_oracledb_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_oracledb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the oracledb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_oracledb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_oracledb_port'($*)) dnl
-
- gen_require(`
- type oracledb_port_t;
- ')
-
- allow $1 oracledb_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_oracledb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the oracledb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_oracledb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_oracledb_port'($*)) dnl
-
- gen_require(`
- type oracledb_port_t;
- ')
-
- allow $1 oracledb_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_oracledb_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the oracledb port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_oracledb_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_oracledb_port'($*)) dnl
-
- gen_require(`
- type oracledb_port_t;
- ')
-
- allow $1 oracledb_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_oracledb_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send oracledb_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_oracledb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_oracledb_client_packets'($*)) dnl
-
- gen_require(`
- type oracledb_client_packet_t;
- ')
-
- allow $1 oracledb_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_oracledb_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send oracledb_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_oracledb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_oracledb_client_packets'($*)) dnl
-
- gen_require(`
- type oracledb_client_packet_t;
- ')
-
- dontaudit $1 oracledb_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_oracledb_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive oracledb_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_oracledb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_oracledb_client_packets'($*)) dnl
-
- gen_require(`
- type oracledb_client_packet_t;
- ')
-
- allow $1 oracledb_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_oracledb_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive oracledb_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_oracledb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_oracledb_client_packets'($*)) dnl
-
- gen_require(`
- type oracledb_client_packet_t;
- ')
-
- dontaudit $1 oracledb_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_oracledb_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive oracledb_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_oracledb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_oracledb_client_packets'($*)) dnl
-
- corenet_send_oracledb_client_packets($1)
- corenet_receive_oracledb_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_oracledb_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive oracledb_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_oracledb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_oracledb_client_packets'($*)) dnl
-
- corenet_dontaudit_send_oracledb_client_packets($1)
- corenet_dontaudit_receive_oracledb_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_oracledb_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to oracledb_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_oracledb_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_oracledb_client_packets'($*)) dnl
-
- gen_require(`
- type oracledb_client_packet_t;
- ')
-
- allow $1 oracledb_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_oracledb_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send oracledb_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_oracledb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_oracledb_server_packets'($*)) dnl
-
- gen_require(`
- type oracledb_server_packet_t;
- ')
-
- allow $1 oracledb_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_oracledb_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send oracledb_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_oracledb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_oracledb_server_packets'($*)) dnl
-
- gen_require(`
- type oracledb_server_packet_t;
- ')
-
- dontaudit $1 oracledb_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_oracledb_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive oracledb_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_oracledb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_oracledb_server_packets'($*)) dnl
-
- gen_require(`
- type oracledb_server_packet_t;
- ')
-
- allow $1 oracledb_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_oracledb_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive oracledb_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_oracledb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_oracledb_server_packets'($*)) dnl
-
- gen_require(`
- type oracledb_server_packet_t;
- ')
-
- dontaudit $1 oracledb_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_oracledb_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive oracledb_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_oracledb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_oracledb_server_packets'($*)) dnl
-
- corenet_send_oracledb_server_packets($1)
- corenet_receive_oracledb_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_oracledb_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive oracledb_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_oracledb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_oracledb_server_packets'($*)) dnl
-
- corenet_dontaudit_send_oracledb_server_packets($1)
- corenet_dontaudit_receive_oracledb_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_oracledb_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to oracledb_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_oracledb_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_oracledb_server_packets'($*)) dnl
-
- gen_require(`
- type oracledb_server_packet_t;
- ')
-
- allow $1 oracledb_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_oracledb_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the ocsp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_ocsp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ocsp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ocsp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the ocsp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_ocsp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ocsp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_ocsp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the ocsp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_ocsp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ocsp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ocsp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the ocsp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_ocsp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ocsp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ocsp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the ocsp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_ocsp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ocsp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ocsp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the ocsp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_ocsp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ocsp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ocsp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the ocsp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_ocsp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ocsp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ocsp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the ocsp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_ocsp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ocsp_port'($*)) dnl
-
- gen_require(`
- type ocsp_port_t;
- ')
-
- allow $1 ocsp_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ocsp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the ocsp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_ocsp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ocsp_port'($*)) dnl
-
- gen_require(`
- type ocsp_port_t;
- ')
-
- allow $1 ocsp_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ocsp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the ocsp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_ocsp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ocsp_port'($*)) dnl
-
- gen_require(`
- type ocsp_port_t;
- ')
-
- allow $1 ocsp_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ocsp_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ocsp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ocsp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ocsp_client_packets'($*)) dnl
-
- gen_require(`
- type ocsp_client_packet_t;
- ')
-
- allow $1 ocsp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ocsp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ocsp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ocsp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ocsp_client_packets'($*)) dnl
-
- gen_require(`
- type ocsp_client_packet_t;
- ')
-
- dontaudit $1 ocsp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ocsp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ocsp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ocsp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ocsp_client_packets'($*)) dnl
-
- gen_require(`
- type ocsp_client_packet_t;
- ')
-
- allow $1 ocsp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ocsp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ocsp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ocsp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ocsp_client_packets'($*)) dnl
-
- gen_require(`
- type ocsp_client_packet_t;
- ')
-
- dontaudit $1 ocsp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ocsp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ocsp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ocsp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ocsp_client_packets'($*)) dnl
-
- corenet_send_ocsp_client_packets($1)
- corenet_receive_ocsp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ocsp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ocsp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ocsp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ocsp_client_packets'($*)) dnl
-
- corenet_dontaudit_send_ocsp_client_packets($1)
- corenet_dontaudit_receive_ocsp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ocsp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ocsp_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ocsp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ocsp_client_packets'($*)) dnl
-
- gen_require(`
- type ocsp_client_packet_t;
- ')
-
- allow $1 ocsp_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ocsp_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ocsp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ocsp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ocsp_server_packets'($*)) dnl
-
- gen_require(`
- type ocsp_server_packet_t;
- ')
-
- allow $1 ocsp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ocsp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ocsp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ocsp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ocsp_server_packets'($*)) dnl
-
- gen_require(`
- type ocsp_server_packet_t;
- ')
-
- dontaudit $1 ocsp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ocsp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ocsp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ocsp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ocsp_server_packets'($*)) dnl
-
- gen_require(`
- type ocsp_server_packet_t;
- ')
-
- allow $1 ocsp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ocsp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ocsp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ocsp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ocsp_server_packets'($*)) dnl
-
- gen_require(`
- type ocsp_server_packet_t;
- ')
-
- dontaudit $1 ocsp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ocsp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ocsp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ocsp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ocsp_server_packets'($*)) dnl
-
- corenet_send_ocsp_server_packets($1)
- corenet_receive_ocsp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ocsp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ocsp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ocsp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ocsp_server_packets'($*)) dnl
-
- corenet_dontaudit_send_ocsp_server_packets($1)
- corenet_dontaudit_receive_ocsp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ocsp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ocsp_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ocsp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ocsp_server_packets'($*)) dnl
-
- gen_require(`
- type ocsp_server_packet_t;
- ')
-
- allow $1 ocsp_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ocsp_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the openhpid port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_openhpid_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_openhpid_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_openhpid_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the openhpid port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_openhpid_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_openhpid_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_openhpid_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the openhpid port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_openhpid_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_openhpid_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_openhpid_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the openhpid port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_openhpid_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_openhpid_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_openhpid_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the openhpid port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_openhpid_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_openhpid_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_openhpid_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the openhpid port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_openhpid_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_openhpid_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_openhpid_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the openhpid port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_openhpid_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_openhpid_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_openhpid_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the openhpid port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_openhpid_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_openhpid_port'($*)) dnl
-
- gen_require(`
- type openhpid_port_t;
- ')
-
- allow $1 openhpid_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_openhpid_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the openhpid port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_openhpid_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_openhpid_port'($*)) dnl
-
- gen_require(`
- type openhpid_port_t;
- ')
-
- allow $1 openhpid_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_openhpid_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the openhpid port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_openhpid_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_openhpid_port'($*)) dnl
-
- gen_require(`
- type openhpid_port_t;
- ')
-
- allow $1 openhpid_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_openhpid_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send openhpid_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_openhpid_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_openhpid_client_packets'($*)) dnl
-
- gen_require(`
- type openhpid_client_packet_t;
- ')
-
- allow $1 openhpid_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_openhpid_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send openhpid_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_openhpid_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_openhpid_client_packets'($*)) dnl
-
- gen_require(`
- type openhpid_client_packet_t;
- ')
-
- dontaudit $1 openhpid_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_openhpid_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive openhpid_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_openhpid_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_openhpid_client_packets'($*)) dnl
-
- gen_require(`
- type openhpid_client_packet_t;
- ')
-
- allow $1 openhpid_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_openhpid_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive openhpid_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_openhpid_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_openhpid_client_packets'($*)) dnl
-
- gen_require(`
- type openhpid_client_packet_t;
- ')
-
- dontaudit $1 openhpid_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_openhpid_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive openhpid_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_openhpid_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_openhpid_client_packets'($*)) dnl
-
- corenet_send_openhpid_client_packets($1)
- corenet_receive_openhpid_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_openhpid_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive openhpid_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_openhpid_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_openhpid_client_packets'($*)) dnl
-
- corenet_dontaudit_send_openhpid_client_packets($1)
- corenet_dontaudit_receive_openhpid_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_openhpid_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to openhpid_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_openhpid_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_openhpid_client_packets'($*)) dnl
-
- gen_require(`
- type openhpid_client_packet_t;
- ')
-
- allow $1 openhpid_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_openhpid_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send openhpid_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_openhpid_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_openhpid_server_packets'($*)) dnl
-
- gen_require(`
- type openhpid_server_packet_t;
- ')
-
- allow $1 openhpid_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_openhpid_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send openhpid_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_openhpid_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_openhpid_server_packets'($*)) dnl
-
- gen_require(`
- type openhpid_server_packet_t;
- ')
-
- dontaudit $1 openhpid_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_openhpid_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive openhpid_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_openhpid_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_openhpid_server_packets'($*)) dnl
-
- gen_require(`
- type openhpid_server_packet_t;
- ')
-
- allow $1 openhpid_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_openhpid_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive openhpid_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_openhpid_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_openhpid_server_packets'($*)) dnl
-
- gen_require(`
- type openhpid_server_packet_t;
- ')
-
- dontaudit $1 openhpid_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_openhpid_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive openhpid_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_openhpid_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_openhpid_server_packets'($*)) dnl
-
- corenet_send_openhpid_server_packets($1)
- corenet_receive_openhpid_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_openhpid_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive openhpid_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_openhpid_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_openhpid_server_packets'($*)) dnl
-
- corenet_dontaudit_send_openhpid_server_packets($1)
- corenet_dontaudit_receive_openhpid_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_openhpid_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to openhpid_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_openhpid_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_openhpid_server_packets'($*)) dnl
-
- gen_require(`
- type openhpid_server_packet_t;
- ')
-
- allow $1 openhpid_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_openhpid_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the openvpn port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_openvpn_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_openvpn_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_openvpn_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the openvpn port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_openvpn_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_openvpn_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_openvpn_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the openvpn port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_openvpn_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_openvpn_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_openvpn_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the openvpn port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_openvpn_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_openvpn_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_openvpn_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the openvpn port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_openvpn_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_openvpn_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_openvpn_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the openvpn port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_openvpn_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_openvpn_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_openvpn_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the openvpn port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_openvpn_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_openvpn_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_openvpn_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the openvpn port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_openvpn_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_openvpn_port'($*)) dnl
-
- gen_require(`
- type openvpn_port_t;
- ')
-
- allow $1 openvpn_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_openvpn_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the openvpn port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_openvpn_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_openvpn_port'($*)) dnl
-
- gen_require(`
- type openvpn_port_t;
- ')
-
- allow $1 openvpn_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_openvpn_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the openvpn port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_openvpn_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_openvpn_port'($*)) dnl
-
- gen_require(`
- type openvpn_port_t;
- ')
-
- allow $1 openvpn_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_openvpn_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send openvpn_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_openvpn_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_openvpn_client_packets'($*)) dnl
-
- gen_require(`
- type openvpn_client_packet_t;
- ')
-
- allow $1 openvpn_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_openvpn_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send openvpn_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_openvpn_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_openvpn_client_packets'($*)) dnl
-
- gen_require(`
- type openvpn_client_packet_t;
- ')
-
- dontaudit $1 openvpn_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_openvpn_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive openvpn_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_openvpn_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_openvpn_client_packets'($*)) dnl
-
- gen_require(`
- type openvpn_client_packet_t;
- ')
-
- allow $1 openvpn_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_openvpn_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive openvpn_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_openvpn_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_openvpn_client_packets'($*)) dnl
-
- gen_require(`
- type openvpn_client_packet_t;
- ')
-
- dontaudit $1 openvpn_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_openvpn_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive openvpn_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_openvpn_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_openvpn_client_packets'($*)) dnl
-
- corenet_send_openvpn_client_packets($1)
- corenet_receive_openvpn_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_openvpn_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive openvpn_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_openvpn_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_openvpn_client_packets'($*)) dnl
-
- corenet_dontaudit_send_openvpn_client_packets($1)
- corenet_dontaudit_receive_openvpn_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_openvpn_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to openvpn_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_openvpn_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_openvpn_client_packets'($*)) dnl
-
- gen_require(`
- type openvpn_client_packet_t;
- ')
-
- allow $1 openvpn_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_openvpn_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send openvpn_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_openvpn_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_openvpn_server_packets'($*)) dnl
-
- gen_require(`
- type openvpn_server_packet_t;
- ')
-
- allow $1 openvpn_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_openvpn_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send openvpn_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_openvpn_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_openvpn_server_packets'($*)) dnl
-
- gen_require(`
- type openvpn_server_packet_t;
- ')
-
- dontaudit $1 openvpn_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_openvpn_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive openvpn_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_openvpn_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_openvpn_server_packets'($*)) dnl
-
- gen_require(`
- type openvpn_server_packet_t;
- ')
-
- allow $1 openvpn_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_openvpn_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive openvpn_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_openvpn_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_openvpn_server_packets'($*)) dnl
-
- gen_require(`
- type openvpn_server_packet_t;
- ')
-
- dontaudit $1 openvpn_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_openvpn_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive openvpn_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_openvpn_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_openvpn_server_packets'($*)) dnl
-
- corenet_send_openvpn_server_packets($1)
- corenet_receive_openvpn_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_openvpn_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive openvpn_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_openvpn_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_openvpn_server_packets'($*)) dnl
-
- corenet_dontaudit_send_openvpn_server_packets($1)
- corenet_dontaudit_receive_openvpn_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_openvpn_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to openvpn_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_openvpn_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_openvpn_server_packets'($*)) dnl
-
- gen_require(`
- type openvpn_server_packet_t;
- ')
-
- allow $1 openvpn_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_openvpn_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the pdps port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_pdps_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_pdps_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_pdps_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the pdps port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_pdps_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_pdps_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_pdps_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the pdps port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_pdps_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_pdps_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_pdps_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the pdps port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_pdps_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_pdps_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_pdps_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the pdps port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_pdps_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_pdps_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_pdps_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the pdps port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_pdps_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_pdps_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_pdps_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the pdps port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_pdps_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_pdps_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_pdps_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the pdps port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_pdps_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_pdps_port'($*)) dnl
-
- gen_require(`
- type pdps_port_t;
- ')
-
- allow $1 pdps_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_pdps_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the pdps port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_pdps_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_pdps_port'($*)) dnl
-
- gen_require(`
- type pdps_port_t;
- ')
-
- allow $1 pdps_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_pdps_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the pdps port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_pdps_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_pdps_port'($*)) dnl
-
- gen_require(`
- type pdps_port_t;
- ')
-
- allow $1 pdps_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_pdps_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send pdps_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_pdps_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_pdps_client_packets'($*)) dnl
-
- gen_require(`
- type pdps_client_packet_t;
- ')
-
- allow $1 pdps_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_pdps_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send pdps_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_pdps_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pdps_client_packets'($*)) dnl
-
- gen_require(`
- type pdps_client_packet_t;
- ')
-
- dontaudit $1 pdps_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pdps_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive pdps_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_pdps_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_pdps_client_packets'($*)) dnl
-
- gen_require(`
- type pdps_client_packet_t;
- ')
-
- allow $1 pdps_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_pdps_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive pdps_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_pdps_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pdps_client_packets'($*)) dnl
-
- gen_require(`
- type pdps_client_packet_t;
- ')
-
- dontaudit $1 pdps_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pdps_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive pdps_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_pdps_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pdps_client_packets'($*)) dnl
-
- corenet_send_pdps_client_packets($1)
- corenet_receive_pdps_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pdps_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive pdps_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_pdps_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pdps_client_packets'($*)) dnl
-
- corenet_dontaudit_send_pdps_client_packets($1)
- corenet_dontaudit_receive_pdps_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pdps_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to pdps_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_pdps_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pdps_client_packets'($*)) dnl
-
- gen_require(`
- type pdps_client_packet_t;
- ')
-
- allow $1 pdps_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_pdps_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send pdps_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_pdps_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_pdps_server_packets'($*)) dnl
-
- gen_require(`
- type pdps_server_packet_t;
- ')
-
- allow $1 pdps_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_pdps_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send pdps_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_pdps_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pdps_server_packets'($*)) dnl
-
- gen_require(`
- type pdps_server_packet_t;
- ')
-
- dontaudit $1 pdps_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pdps_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive pdps_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_pdps_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_pdps_server_packets'($*)) dnl
-
- gen_require(`
- type pdps_server_packet_t;
- ')
-
- allow $1 pdps_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_pdps_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive pdps_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_pdps_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pdps_server_packets'($*)) dnl
-
- gen_require(`
- type pdps_server_packet_t;
- ')
-
- dontaudit $1 pdps_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pdps_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive pdps_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_pdps_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pdps_server_packets'($*)) dnl
-
- corenet_send_pdps_server_packets($1)
- corenet_receive_pdps_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pdps_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive pdps_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_pdps_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pdps_server_packets'($*)) dnl
-
- corenet_dontaudit_send_pdps_server_packets($1)
- corenet_dontaudit_receive_pdps_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pdps_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to pdps_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_pdps_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pdps_server_packets'($*)) dnl
-
- gen_require(`
- type pdps_server_packet_t;
- ')
-
- allow $1 pdps_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_pdps_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the pegasus_http port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_pegasus_http_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_pegasus_http_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_pegasus_http_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the pegasus_http port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_pegasus_http_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_pegasus_http_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_pegasus_http_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the pegasus_http port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_pegasus_http_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_pegasus_http_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_pegasus_http_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the pegasus_http port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_pegasus_http_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_pegasus_http_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_pegasus_http_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the pegasus_http port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_pegasus_http_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_pegasus_http_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_pegasus_http_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the pegasus_http port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_pegasus_http_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_pegasus_http_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_pegasus_http_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the pegasus_http port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_pegasus_http_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_pegasus_http_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_pegasus_http_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the pegasus_http port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_pegasus_http_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_pegasus_http_port'($*)) dnl
-
- gen_require(`
- type pegasus_http_port_t;
- ')
-
- allow $1 pegasus_http_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_pegasus_http_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the pegasus_http port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_pegasus_http_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_pegasus_http_port'($*)) dnl
-
- gen_require(`
- type pegasus_http_port_t;
- ')
-
- allow $1 pegasus_http_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_pegasus_http_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the pegasus_http port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_pegasus_http_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_pegasus_http_port'($*)) dnl
-
- gen_require(`
- type pegasus_http_port_t;
- ')
-
- allow $1 pegasus_http_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_pegasus_http_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send pegasus_http_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_pegasus_http_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_pegasus_http_client_packets'($*)) dnl
-
- gen_require(`
- type pegasus_http_client_packet_t;
- ')
-
- allow $1 pegasus_http_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_pegasus_http_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send pegasus_http_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_pegasus_http_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pegasus_http_client_packets'($*)) dnl
-
- gen_require(`
- type pegasus_http_client_packet_t;
- ')
-
- dontaudit $1 pegasus_http_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pegasus_http_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive pegasus_http_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_pegasus_http_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_pegasus_http_client_packets'($*)) dnl
-
- gen_require(`
- type pegasus_http_client_packet_t;
- ')
-
- allow $1 pegasus_http_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_pegasus_http_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive pegasus_http_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_pegasus_http_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pegasus_http_client_packets'($*)) dnl
-
- gen_require(`
- type pegasus_http_client_packet_t;
- ')
-
- dontaudit $1 pegasus_http_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pegasus_http_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive pegasus_http_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_pegasus_http_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pegasus_http_client_packets'($*)) dnl
-
- corenet_send_pegasus_http_client_packets($1)
- corenet_receive_pegasus_http_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pegasus_http_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive pegasus_http_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_pegasus_http_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pegasus_http_client_packets'($*)) dnl
-
- corenet_dontaudit_send_pegasus_http_client_packets($1)
- corenet_dontaudit_receive_pegasus_http_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pegasus_http_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to pegasus_http_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_pegasus_http_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pegasus_http_client_packets'($*)) dnl
-
- gen_require(`
- type pegasus_http_client_packet_t;
- ')
-
- allow $1 pegasus_http_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_pegasus_http_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send pegasus_http_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_pegasus_http_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_pegasus_http_server_packets'($*)) dnl
-
- gen_require(`
- type pegasus_http_server_packet_t;
- ')
-
- allow $1 pegasus_http_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_pegasus_http_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send pegasus_http_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_pegasus_http_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pegasus_http_server_packets'($*)) dnl
-
- gen_require(`
- type pegasus_http_server_packet_t;
- ')
-
- dontaudit $1 pegasus_http_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pegasus_http_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive pegasus_http_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_pegasus_http_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_pegasus_http_server_packets'($*)) dnl
-
- gen_require(`
- type pegasus_http_server_packet_t;
- ')
-
- allow $1 pegasus_http_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_pegasus_http_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive pegasus_http_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_pegasus_http_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pegasus_http_server_packets'($*)) dnl
-
- gen_require(`
- type pegasus_http_server_packet_t;
- ')
-
- dontaudit $1 pegasus_http_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pegasus_http_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive pegasus_http_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_pegasus_http_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pegasus_http_server_packets'($*)) dnl
-
- corenet_send_pegasus_http_server_packets($1)
- corenet_receive_pegasus_http_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pegasus_http_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive pegasus_http_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_pegasus_http_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pegasus_http_server_packets'($*)) dnl
-
- corenet_dontaudit_send_pegasus_http_server_packets($1)
- corenet_dontaudit_receive_pegasus_http_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pegasus_http_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to pegasus_http_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_pegasus_http_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pegasus_http_server_packets'($*)) dnl
-
- gen_require(`
- type pegasus_http_server_packet_t;
- ')
-
- allow $1 pegasus_http_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_pegasus_http_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the pegasus_https port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_pegasus_https_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_pegasus_https_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_pegasus_https_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the pegasus_https port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_pegasus_https_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_pegasus_https_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_pegasus_https_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the pegasus_https port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_pegasus_https_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_pegasus_https_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_pegasus_https_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the pegasus_https port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_pegasus_https_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_pegasus_https_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_pegasus_https_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the pegasus_https port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_pegasus_https_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_pegasus_https_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_pegasus_https_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the pegasus_https port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_pegasus_https_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_pegasus_https_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_pegasus_https_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the pegasus_https port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_pegasus_https_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_pegasus_https_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_pegasus_https_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the pegasus_https port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_pegasus_https_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_pegasus_https_port'($*)) dnl
-
- gen_require(`
- type pegasus_https_port_t;
- ')
-
- allow $1 pegasus_https_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_pegasus_https_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the pegasus_https port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_pegasus_https_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_pegasus_https_port'($*)) dnl
-
- gen_require(`
- type pegasus_https_port_t;
- ')
-
- allow $1 pegasus_https_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_pegasus_https_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the pegasus_https port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_pegasus_https_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_pegasus_https_port'($*)) dnl
-
- gen_require(`
- type pegasus_https_port_t;
- ')
-
- allow $1 pegasus_https_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_pegasus_https_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send pegasus_https_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_pegasus_https_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_pegasus_https_client_packets'($*)) dnl
-
- gen_require(`
- type pegasus_https_client_packet_t;
- ')
-
- allow $1 pegasus_https_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_pegasus_https_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send pegasus_https_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_pegasus_https_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pegasus_https_client_packets'($*)) dnl
-
- gen_require(`
- type pegasus_https_client_packet_t;
- ')
-
- dontaudit $1 pegasus_https_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pegasus_https_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive pegasus_https_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_pegasus_https_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_pegasus_https_client_packets'($*)) dnl
-
- gen_require(`
- type pegasus_https_client_packet_t;
- ')
-
- allow $1 pegasus_https_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_pegasus_https_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive pegasus_https_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_pegasus_https_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pegasus_https_client_packets'($*)) dnl
-
- gen_require(`
- type pegasus_https_client_packet_t;
- ')
-
- dontaudit $1 pegasus_https_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pegasus_https_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive pegasus_https_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_pegasus_https_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pegasus_https_client_packets'($*)) dnl
-
- corenet_send_pegasus_https_client_packets($1)
- corenet_receive_pegasus_https_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pegasus_https_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive pegasus_https_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_pegasus_https_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pegasus_https_client_packets'($*)) dnl
-
- corenet_dontaudit_send_pegasus_https_client_packets($1)
- corenet_dontaudit_receive_pegasus_https_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pegasus_https_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to pegasus_https_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_pegasus_https_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pegasus_https_client_packets'($*)) dnl
-
- gen_require(`
- type pegasus_https_client_packet_t;
- ')
-
- allow $1 pegasus_https_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_pegasus_https_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send pegasus_https_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_pegasus_https_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_pegasus_https_server_packets'($*)) dnl
-
- gen_require(`
- type pegasus_https_server_packet_t;
- ')
-
- allow $1 pegasus_https_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_pegasus_https_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send pegasus_https_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_pegasus_https_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pegasus_https_server_packets'($*)) dnl
-
- gen_require(`
- type pegasus_https_server_packet_t;
- ')
-
- dontaudit $1 pegasus_https_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pegasus_https_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive pegasus_https_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_pegasus_https_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_pegasus_https_server_packets'($*)) dnl
-
- gen_require(`
- type pegasus_https_server_packet_t;
- ')
-
- allow $1 pegasus_https_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_pegasus_https_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive pegasus_https_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_pegasus_https_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pegasus_https_server_packets'($*)) dnl
-
- gen_require(`
- type pegasus_https_server_packet_t;
- ')
-
- dontaudit $1 pegasus_https_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pegasus_https_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive pegasus_https_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_pegasus_https_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pegasus_https_server_packets'($*)) dnl
-
- corenet_send_pegasus_https_server_packets($1)
- corenet_receive_pegasus_https_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pegasus_https_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive pegasus_https_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_pegasus_https_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pegasus_https_server_packets'($*)) dnl
-
- corenet_dontaudit_send_pegasus_https_server_packets($1)
- corenet_dontaudit_receive_pegasus_https_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pegasus_https_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to pegasus_https_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_pegasus_https_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pegasus_https_server_packets'($*)) dnl
-
- gen_require(`
- type pegasus_https_server_packet_t;
- ')
-
- allow $1 pegasus_https_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_pegasus_https_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the pgpkeyserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_pgpkeyserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_pgpkeyserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_pgpkeyserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the pgpkeyserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_pgpkeyserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_pgpkeyserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_pgpkeyserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the pgpkeyserver port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_pgpkeyserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_pgpkeyserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_pgpkeyserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the pgpkeyserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_pgpkeyserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_pgpkeyserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_pgpkeyserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the pgpkeyserver port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_pgpkeyserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_pgpkeyserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_pgpkeyserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the pgpkeyserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_pgpkeyserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_pgpkeyserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_pgpkeyserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the pgpkeyserver port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_pgpkeyserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_pgpkeyserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_pgpkeyserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the pgpkeyserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_pgpkeyserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_pgpkeyserver_port'($*)) dnl
-
- gen_require(`
- type pgpkeyserver_port_t;
- ')
-
- allow $1 pgpkeyserver_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_pgpkeyserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the pgpkeyserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_pgpkeyserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_pgpkeyserver_port'($*)) dnl
-
- gen_require(`
- type pgpkeyserver_port_t;
- ')
-
- allow $1 pgpkeyserver_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_pgpkeyserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the pgpkeyserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_pgpkeyserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_pgpkeyserver_port'($*)) dnl
-
- gen_require(`
- type pgpkeyserver_port_t;
- ')
-
- allow $1 pgpkeyserver_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_pgpkeyserver_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send pgpkeyserver_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_pgpkeyserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_pgpkeyserver_client_packets'($*)) dnl
-
- gen_require(`
- type pgpkeyserver_client_packet_t;
- ')
-
- allow $1 pgpkeyserver_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_pgpkeyserver_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send pgpkeyserver_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_pgpkeyserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pgpkeyserver_client_packets'($*)) dnl
-
- gen_require(`
- type pgpkeyserver_client_packet_t;
- ')
-
- dontaudit $1 pgpkeyserver_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pgpkeyserver_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive pgpkeyserver_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_pgpkeyserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_pgpkeyserver_client_packets'($*)) dnl
-
- gen_require(`
- type pgpkeyserver_client_packet_t;
- ')
-
- allow $1 pgpkeyserver_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_pgpkeyserver_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive pgpkeyserver_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_pgpkeyserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pgpkeyserver_client_packets'($*)) dnl
-
- gen_require(`
- type pgpkeyserver_client_packet_t;
- ')
-
- dontaudit $1 pgpkeyserver_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pgpkeyserver_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive pgpkeyserver_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_pgpkeyserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pgpkeyserver_client_packets'($*)) dnl
-
- corenet_send_pgpkeyserver_client_packets($1)
- corenet_receive_pgpkeyserver_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pgpkeyserver_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive pgpkeyserver_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_pgpkeyserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pgpkeyserver_client_packets'($*)) dnl
-
- corenet_dontaudit_send_pgpkeyserver_client_packets($1)
- corenet_dontaudit_receive_pgpkeyserver_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pgpkeyserver_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to pgpkeyserver_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_pgpkeyserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pgpkeyserver_client_packets'($*)) dnl
-
- gen_require(`
- type pgpkeyserver_client_packet_t;
- ')
-
- allow $1 pgpkeyserver_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_pgpkeyserver_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send pgpkeyserver_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_pgpkeyserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_pgpkeyserver_server_packets'($*)) dnl
-
- gen_require(`
- type pgpkeyserver_server_packet_t;
- ')
-
- allow $1 pgpkeyserver_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_pgpkeyserver_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send pgpkeyserver_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_pgpkeyserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pgpkeyserver_server_packets'($*)) dnl
-
- gen_require(`
- type pgpkeyserver_server_packet_t;
- ')
-
- dontaudit $1 pgpkeyserver_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pgpkeyserver_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive pgpkeyserver_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_pgpkeyserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_pgpkeyserver_server_packets'($*)) dnl
-
- gen_require(`
- type pgpkeyserver_server_packet_t;
- ')
-
- allow $1 pgpkeyserver_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_pgpkeyserver_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive pgpkeyserver_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_pgpkeyserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pgpkeyserver_server_packets'($*)) dnl
-
- gen_require(`
- type pgpkeyserver_server_packet_t;
- ')
-
- dontaudit $1 pgpkeyserver_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pgpkeyserver_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive pgpkeyserver_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_pgpkeyserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pgpkeyserver_server_packets'($*)) dnl
-
- corenet_send_pgpkeyserver_server_packets($1)
- corenet_receive_pgpkeyserver_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pgpkeyserver_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive pgpkeyserver_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_pgpkeyserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pgpkeyserver_server_packets'($*)) dnl
-
- corenet_dontaudit_send_pgpkeyserver_server_packets($1)
- corenet_dontaudit_receive_pgpkeyserver_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pgpkeyserver_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to pgpkeyserver_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_pgpkeyserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pgpkeyserver_server_packets'($*)) dnl
-
- gen_require(`
- type pgpkeyserver_server_packet_t;
- ')
-
- allow $1 pgpkeyserver_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_pgpkeyserver_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the pingd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_pingd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_pingd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_pingd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the pingd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_pingd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_pingd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_pingd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the pingd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_pingd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_pingd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_pingd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the pingd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_pingd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_pingd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_pingd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the pingd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_pingd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_pingd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_pingd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the pingd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_pingd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_pingd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_pingd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the pingd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_pingd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_pingd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_pingd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the pingd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_pingd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_pingd_port'($*)) dnl
-
- gen_require(`
- type pingd_port_t;
- ')
-
- allow $1 pingd_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_pingd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the pingd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_pingd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_pingd_port'($*)) dnl
-
- gen_require(`
- type pingd_port_t;
- ')
-
- allow $1 pingd_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_pingd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the pingd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_pingd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_pingd_port'($*)) dnl
-
- gen_require(`
- type pingd_port_t;
- ')
-
- allow $1 pingd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_pingd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send pingd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_pingd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_pingd_client_packets'($*)) dnl
-
- gen_require(`
- type pingd_client_packet_t;
- ')
-
- allow $1 pingd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_pingd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send pingd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_pingd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pingd_client_packets'($*)) dnl
-
- gen_require(`
- type pingd_client_packet_t;
- ')
-
- dontaudit $1 pingd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pingd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive pingd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_pingd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_pingd_client_packets'($*)) dnl
-
- gen_require(`
- type pingd_client_packet_t;
- ')
-
- allow $1 pingd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_pingd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive pingd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_pingd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pingd_client_packets'($*)) dnl
-
- gen_require(`
- type pingd_client_packet_t;
- ')
-
- dontaudit $1 pingd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pingd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive pingd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_pingd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pingd_client_packets'($*)) dnl
-
- corenet_send_pingd_client_packets($1)
- corenet_receive_pingd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pingd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive pingd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_pingd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pingd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_pingd_client_packets($1)
- corenet_dontaudit_receive_pingd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pingd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to pingd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_pingd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pingd_client_packets'($*)) dnl
-
- gen_require(`
- type pingd_client_packet_t;
- ')
-
- allow $1 pingd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_pingd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send pingd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_pingd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_pingd_server_packets'($*)) dnl
-
- gen_require(`
- type pingd_server_packet_t;
- ')
-
- allow $1 pingd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_pingd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send pingd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_pingd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pingd_server_packets'($*)) dnl
-
- gen_require(`
- type pingd_server_packet_t;
- ')
-
- dontaudit $1 pingd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pingd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive pingd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_pingd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_pingd_server_packets'($*)) dnl
-
- gen_require(`
- type pingd_server_packet_t;
- ')
-
- allow $1 pingd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_pingd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive pingd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_pingd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pingd_server_packets'($*)) dnl
-
- gen_require(`
- type pingd_server_packet_t;
- ')
-
- dontaudit $1 pingd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pingd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive pingd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_pingd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pingd_server_packets'($*)) dnl
-
- corenet_send_pingd_server_packets($1)
- corenet_receive_pingd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pingd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive pingd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_pingd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pingd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_pingd_server_packets($1)
- corenet_dontaudit_receive_pingd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pingd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to pingd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_pingd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pingd_server_packets'($*)) dnl
-
- gen_require(`
- type pingd_server_packet_t;
- ')
-
- allow $1 pingd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_pingd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the pktcable_cops port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_pktcable_cops_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_pktcable_cops_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_pktcable_cops_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the pktcable_cops port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_pktcable_cops_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_pktcable_cops_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_pktcable_cops_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the pktcable_cops port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_pktcable_cops_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_pktcable_cops_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_pktcable_cops_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the pktcable_cops port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_pktcable_cops_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_pktcable_cops_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_pktcable_cops_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the pktcable_cops port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_pktcable_cops_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_pktcable_cops_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_pktcable_cops_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the pktcable_cops port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_pktcable_cops_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_pktcable_cops_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_pktcable_cops_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the pktcable_cops port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_pktcable_cops_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_pktcable_cops_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_pktcable_cops_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the pktcable_cops port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_pktcable_cops_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_pktcable_cops_port'($*)) dnl
-
- gen_require(`
- type pktcable_cops_port_t;
- ')
-
- allow $1 pktcable_cops_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_pktcable_cops_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the pktcable_cops port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_pktcable_cops_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_pktcable_cops_port'($*)) dnl
-
- gen_require(`
- type pktcable_cops_port_t;
- ')
-
- allow $1 pktcable_cops_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_pktcable_cops_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the pktcable_cops port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_pktcable_cops_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_pktcable_cops_port'($*)) dnl
-
- gen_require(`
- type pktcable_cops_port_t;
- ')
-
- allow $1 pktcable_cops_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_pktcable_cops_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send pktcable_cops_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_pktcable_cops_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_pktcable_cops_client_packets'($*)) dnl
-
- gen_require(`
- type pktcable_cops_client_packet_t;
- ')
-
- allow $1 pktcable_cops_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_pktcable_cops_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send pktcable_cops_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_pktcable_cops_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pktcable_cops_client_packets'($*)) dnl
-
- gen_require(`
- type pktcable_cops_client_packet_t;
- ')
-
- dontaudit $1 pktcable_cops_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pktcable_cops_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive pktcable_cops_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_pktcable_cops_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_pktcable_cops_client_packets'($*)) dnl
-
- gen_require(`
- type pktcable_cops_client_packet_t;
- ')
-
- allow $1 pktcable_cops_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_pktcable_cops_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive pktcable_cops_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_pktcable_cops_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pktcable_cops_client_packets'($*)) dnl
-
- gen_require(`
- type pktcable_cops_client_packet_t;
- ')
-
- dontaudit $1 pktcable_cops_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pktcable_cops_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive pktcable_cops_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_pktcable_cops_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pktcable_cops_client_packets'($*)) dnl
-
- corenet_send_pktcable_cops_client_packets($1)
- corenet_receive_pktcable_cops_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pktcable_cops_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive pktcable_cops_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_pktcable_cops_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pktcable_cops_client_packets'($*)) dnl
-
- corenet_dontaudit_send_pktcable_cops_client_packets($1)
- corenet_dontaudit_receive_pktcable_cops_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pktcable_cops_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to pktcable_cops_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_pktcable_cops_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pktcable_cops_client_packets'($*)) dnl
-
- gen_require(`
- type pktcable_cops_client_packet_t;
- ')
-
- allow $1 pktcable_cops_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_pktcable_cops_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send pktcable_cops_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_pktcable_cops_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_pktcable_cops_server_packets'($*)) dnl
-
- gen_require(`
- type pktcable_cops_server_packet_t;
- ')
-
- allow $1 pktcable_cops_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_pktcable_cops_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send pktcable_cops_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_pktcable_cops_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pktcable_cops_server_packets'($*)) dnl
-
- gen_require(`
- type pktcable_cops_server_packet_t;
- ')
-
- dontaudit $1 pktcable_cops_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pktcable_cops_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive pktcable_cops_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_pktcable_cops_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_pktcable_cops_server_packets'($*)) dnl
-
- gen_require(`
- type pktcable_cops_server_packet_t;
- ')
-
- allow $1 pktcable_cops_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_pktcable_cops_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive pktcable_cops_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_pktcable_cops_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pktcable_cops_server_packets'($*)) dnl
-
- gen_require(`
- type pktcable_cops_server_packet_t;
- ')
-
- dontaudit $1 pktcable_cops_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pktcable_cops_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive pktcable_cops_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_pktcable_cops_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pktcable_cops_server_packets'($*)) dnl
-
- corenet_send_pktcable_cops_server_packets($1)
- corenet_receive_pktcable_cops_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pktcable_cops_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive pktcable_cops_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_pktcable_cops_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pktcable_cops_server_packets'($*)) dnl
-
- corenet_dontaudit_send_pktcable_cops_server_packets($1)
- corenet_dontaudit_receive_pktcable_cops_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pktcable_cops_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to pktcable_cops_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_pktcable_cops_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pktcable_cops_server_packets'($*)) dnl
-
- gen_require(`
- type pktcable_cops_server_packet_t;
- ')
-
- allow $1 pktcable_cops_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_pktcable_cops_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the pop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_pop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_pop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_pop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the pop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_pop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_pop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_pop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the pop port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_pop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_pop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_pop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the pop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_pop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_pop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_pop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the pop port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_pop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_pop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_pop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the pop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_pop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_pop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_pop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the pop port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_pop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_pop_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_pop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the pop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_pop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_pop_port'($*)) dnl
-
- gen_require(`
- type pop_port_t;
- ')
-
- allow $1 pop_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_pop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the pop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_pop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_pop_port'($*)) dnl
-
- gen_require(`
- type pop_port_t;
- ')
-
- allow $1 pop_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_pop_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the pop port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_pop_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_pop_port'($*)) dnl
-
- gen_require(`
- type pop_port_t;
- ')
-
- allow $1 pop_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_pop_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send pop_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_pop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_pop_client_packets'($*)) dnl
-
- gen_require(`
- type pop_client_packet_t;
- ')
-
- allow $1 pop_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_pop_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send pop_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_pop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pop_client_packets'($*)) dnl
-
- gen_require(`
- type pop_client_packet_t;
- ')
-
- dontaudit $1 pop_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pop_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive pop_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_pop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_pop_client_packets'($*)) dnl
-
- gen_require(`
- type pop_client_packet_t;
- ')
-
- allow $1 pop_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_pop_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive pop_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_pop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pop_client_packets'($*)) dnl
-
- gen_require(`
- type pop_client_packet_t;
- ')
-
- dontaudit $1 pop_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pop_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive pop_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_pop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pop_client_packets'($*)) dnl
-
- corenet_send_pop_client_packets($1)
- corenet_receive_pop_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pop_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive pop_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_pop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pop_client_packets'($*)) dnl
-
- corenet_dontaudit_send_pop_client_packets($1)
- corenet_dontaudit_receive_pop_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pop_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to pop_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_pop_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pop_client_packets'($*)) dnl
-
- gen_require(`
- type pop_client_packet_t;
- ')
-
- allow $1 pop_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_pop_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send pop_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_pop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_pop_server_packets'($*)) dnl
-
- gen_require(`
- type pop_server_packet_t;
- ')
-
- allow $1 pop_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_pop_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send pop_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_pop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pop_server_packets'($*)) dnl
-
- gen_require(`
- type pop_server_packet_t;
- ')
-
- dontaudit $1 pop_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pop_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive pop_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_pop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_pop_server_packets'($*)) dnl
-
- gen_require(`
- type pop_server_packet_t;
- ')
-
- allow $1 pop_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_pop_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive pop_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_pop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pop_server_packets'($*)) dnl
-
- gen_require(`
- type pop_server_packet_t;
- ')
-
- dontaudit $1 pop_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pop_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive pop_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_pop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pop_server_packets'($*)) dnl
-
- corenet_send_pop_server_packets($1)
- corenet_receive_pop_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pop_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive pop_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_pop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pop_server_packets'($*)) dnl
-
- corenet_dontaudit_send_pop_server_packets($1)
- corenet_dontaudit_receive_pop_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pop_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to pop_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_pop_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pop_server_packets'($*)) dnl
-
- gen_require(`
- type pop_server_packet_t;
- ')
-
- allow $1 pop_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_pop_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the portmap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_portmap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_portmap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_portmap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the portmap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_portmap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_portmap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_portmap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the portmap port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_portmap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_portmap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_portmap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the portmap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_portmap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_portmap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_portmap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the portmap port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_portmap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_portmap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_portmap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the portmap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_portmap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_portmap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_portmap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the portmap port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_portmap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_portmap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_portmap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the portmap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_portmap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_portmap_port'($*)) dnl
-
- gen_require(`
- type portmap_port_t;
- ')
-
- allow $1 portmap_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_portmap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the portmap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_portmap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_portmap_port'($*)) dnl
-
- gen_require(`
- type portmap_port_t;
- ')
-
- allow $1 portmap_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_portmap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the portmap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_portmap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_portmap_port'($*)) dnl
-
- gen_require(`
- type portmap_port_t;
- ')
-
- allow $1 portmap_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_portmap_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send portmap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_portmap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_portmap_client_packets'($*)) dnl
-
- gen_require(`
- type portmap_client_packet_t;
- ')
-
- allow $1 portmap_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_portmap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send portmap_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_portmap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_portmap_client_packets'($*)) dnl
-
- gen_require(`
- type portmap_client_packet_t;
- ')
-
- dontaudit $1 portmap_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_portmap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive portmap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_portmap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_portmap_client_packets'($*)) dnl
-
- gen_require(`
- type portmap_client_packet_t;
- ')
-
- allow $1 portmap_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_portmap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive portmap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_portmap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_portmap_client_packets'($*)) dnl
-
- gen_require(`
- type portmap_client_packet_t;
- ')
-
- dontaudit $1 portmap_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_portmap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive portmap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_portmap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_portmap_client_packets'($*)) dnl
-
- corenet_send_portmap_client_packets($1)
- corenet_receive_portmap_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_portmap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive portmap_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_portmap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_portmap_client_packets'($*)) dnl
-
- corenet_dontaudit_send_portmap_client_packets($1)
- corenet_dontaudit_receive_portmap_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_portmap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to portmap_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_portmap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_portmap_client_packets'($*)) dnl
-
- gen_require(`
- type portmap_client_packet_t;
- ')
-
- allow $1 portmap_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_portmap_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send portmap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_portmap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_portmap_server_packets'($*)) dnl
-
- gen_require(`
- type portmap_server_packet_t;
- ')
-
- allow $1 portmap_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_portmap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send portmap_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_portmap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_portmap_server_packets'($*)) dnl
-
- gen_require(`
- type portmap_server_packet_t;
- ')
-
- dontaudit $1 portmap_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_portmap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive portmap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_portmap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_portmap_server_packets'($*)) dnl
-
- gen_require(`
- type portmap_server_packet_t;
- ')
-
- allow $1 portmap_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_portmap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive portmap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_portmap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_portmap_server_packets'($*)) dnl
-
- gen_require(`
- type portmap_server_packet_t;
- ')
-
- dontaudit $1 portmap_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_portmap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive portmap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_portmap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_portmap_server_packets'($*)) dnl
-
- corenet_send_portmap_server_packets($1)
- corenet_receive_portmap_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_portmap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive portmap_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_portmap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_portmap_server_packets'($*)) dnl
-
- corenet_dontaudit_send_portmap_server_packets($1)
- corenet_dontaudit_receive_portmap_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_portmap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to portmap_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_portmap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_portmap_server_packets'($*)) dnl
-
- gen_require(`
- type portmap_server_packet_t;
- ')
-
- allow $1 portmap_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_portmap_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the postfix_policyd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_postfix_policyd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_postfix_policyd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_postfix_policyd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the postfix_policyd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_postfix_policyd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_postfix_policyd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_postfix_policyd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the postfix_policyd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_postfix_policyd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_postfix_policyd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_postfix_policyd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the postfix_policyd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_postfix_policyd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_postfix_policyd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_postfix_policyd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the postfix_policyd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_postfix_policyd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_postfix_policyd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_postfix_policyd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the postfix_policyd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_postfix_policyd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_postfix_policyd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_postfix_policyd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the postfix_policyd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_postfix_policyd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_postfix_policyd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_postfix_policyd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the postfix_policyd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_postfix_policyd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_postfix_policyd_port'($*)) dnl
-
- gen_require(`
- type postfix_policyd_port_t;
- ')
-
- allow $1 postfix_policyd_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_postfix_policyd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the postfix_policyd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_postfix_policyd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_postfix_policyd_port'($*)) dnl
-
- gen_require(`
- type postfix_policyd_port_t;
- ')
-
- allow $1 postfix_policyd_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_postfix_policyd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the postfix_policyd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_postfix_policyd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_postfix_policyd_port'($*)) dnl
-
- gen_require(`
- type postfix_policyd_port_t;
- ')
-
- allow $1 postfix_policyd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_postfix_policyd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send postfix_policyd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_postfix_policyd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_postfix_policyd_client_packets'($*)) dnl
-
- gen_require(`
- type postfix_policyd_client_packet_t;
- ')
-
- allow $1 postfix_policyd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_postfix_policyd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send postfix_policyd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_postfix_policyd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_postfix_policyd_client_packets'($*)) dnl
-
- gen_require(`
- type postfix_policyd_client_packet_t;
- ')
-
- dontaudit $1 postfix_policyd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_postfix_policyd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive postfix_policyd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_postfix_policyd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_postfix_policyd_client_packets'($*)) dnl
-
- gen_require(`
- type postfix_policyd_client_packet_t;
- ')
-
- allow $1 postfix_policyd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_postfix_policyd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive postfix_policyd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_postfix_policyd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_postfix_policyd_client_packets'($*)) dnl
-
- gen_require(`
- type postfix_policyd_client_packet_t;
- ')
-
- dontaudit $1 postfix_policyd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_postfix_policyd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive postfix_policyd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_postfix_policyd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_postfix_policyd_client_packets'($*)) dnl
-
- corenet_send_postfix_policyd_client_packets($1)
- corenet_receive_postfix_policyd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_postfix_policyd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive postfix_policyd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_postfix_policyd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_postfix_policyd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_postfix_policyd_client_packets($1)
- corenet_dontaudit_receive_postfix_policyd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_postfix_policyd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to postfix_policyd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_postfix_policyd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_postfix_policyd_client_packets'($*)) dnl
-
- gen_require(`
- type postfix_policyd_client_packet_t;
- ')
-
- allow $1 postfix_policyd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_postfix_policyd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send postfix_policyd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_postfix_policyd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_postfix_policyd_server_packets'($*)) dnl
-
- gen_require(`
- type postfix_policyd_server_packet_t;
- ')
-
- allow $1 postfix_policyd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_postfix_policyd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send postfix_policyd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_postfix_policyd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_postfix_policyd_server_packets'($*)) dnl
-
- gen_require(`
- type postfix_policyd_server_packet_t;
- ')
-
- dontaudit $1 postfix_policyd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_postfix_policyd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive postfix_policyd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_postfix_policyd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_postfix_policyd_server_packets'($*)) dnl
-
- gen_require(`
- type postfix_policyd_server_packet_t;
- ')
-
- allow $1 postfix_policyd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_postfix_policyd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive postfix_policyd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_postfix_policyd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_postfix_policyd_server_packets'($*)) dnl
-
- gen_require(`
- type postfix_policyd_server_packet_t;
- ')
-
- dontaudit $1 postfix_policyd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_postfix_policyd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive postfix_policyd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_postfix_policyd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_postfix_policyd_server_packets'($*)) dnl
-
- corenet_send_postfix_policyd_server_packets($1)
- corenet_receive_postfix_policyd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_postfix_policyd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive postfix_policyd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_postfix_policyd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_postfix_policyd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_postfix_policyd_server_packets($1)
- corenet_dontaudit_receive_postfix_policyd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_postfix_policyd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to postfix_policyd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_postfix_policyd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_postfix_policyd_server_packets'($*)) dnl
-
- gen_require(`
- type postfix_policyd_server_packet_t;
- ')
-
- allow $1 postfix_policyd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_postfix_policyd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the postgresql port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_postgresql_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_postgresql_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_postgresql_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the postgresql port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_postgresql_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_postgresql_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_postgresql_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the postgresql port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_postgresql_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_postgresql_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_postgresql_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the postgresql port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_postgresql_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_postgresql_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_postgresql_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the postgresql port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_postgresql_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_postgresql_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_postgresql_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the postgresql port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_postgresql_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_postgresql_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_postgresql_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the postgresql port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_postgresql_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_postgresql_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_postgresql_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the postgresql port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_postgresql_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_postgresql_port'($*)) dnl
-
- gen_require(`
- type postgresql_port_t;
- ')
-
- allow $1 postgresql_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_postgresql_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the postgresql port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_postgresql_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_postgresql_port'($*)) dnl
-
- gen_require(`
- type postgresql_port_t;
- ')
-
- allow $1 postgresql_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_postgresql_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the postgresql port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_postgresql_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_postgresql_port'($*)) dnl
-
- gen_require(`
- type postgresql_port_t;
- ')
-
- allow $1 postgresql_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_postgresql_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send postgresql_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_postgresql_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_postgresql_client_packets'($*)) dnl
-
- gen_require(`
- type postgresql_client_packet_t;
- ')
-
- allow $1 postgresql_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_postgresql_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send postgresql_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_postgresql_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_postgresql_client_packets'($*)) dnl
-
- gen_require(`
- type postgresql_client_packet_t;
- ')
-
- dontaudit $1 postgresql_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_postgresql_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive postgresql_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_postgresql_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_postgresql_client_packets'($*)) dnl
-
- gen_require(`
- type postgresql_client_packet_t;
- ')
-
- allow $1 postgresql_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_postgresql_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive postgresql_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_postgresql_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_postgresql_client_packets'($*)) dnl
-
- gen_require(`
- type postgresql_client_packet_t;
- ')
-
- dontaudit $1 postgresql_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_postgresql_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive postgresql_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_postgresql_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_postgresql_client_packets'($*)) dnl
-
- corenet_send_postgresql_client_packets($1)
- corenet_receive_postgresql_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_postgresql_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive postgresql_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_postgresql_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_postgresql_client_packets'($*)) dnl
-
- corenet_dontaudit_send_postgresql_client_packets($1)
- corenet_dontaudit_receive_postgresql_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_postgresql_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to postgresql_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_postgresql_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_postgresql_client_packets'($*)) dnl
-
- gen_require(`
- type postgresql_client_packet_t;
- ')
-
- allow $1 postgresql_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_postgresql_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send postgresql_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_postgresql_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_postgresql_server_packets'($*)) dnl
-
- gen_require(`
- type postgresql_server_packet_t;
- ')
-
- allow $1 postgresql_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_postgresql_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send postgresql_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_postgresql_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_postgresql_server_packets'($*)) dnl
-
- gen_require(`
- type postgresql_server_packet_t;
- ')
-
- dontaudit $1 postgresql_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_postgresql_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive postgresql_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_postgresql_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_postgresql_server_packets'($*)) dnl
-
- gen_require(`
- type postgresql_server_packet_t;
- ')
-
- allow $1 postgresql_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_postgresql_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive postgresql_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_postgresql_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_postgresql_server_packets'($*)) dnl
-
- gen_require(`
- type postgresql_server_packet_t;
- ')
-
- dontaudit $1 postgresql_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_postgresql_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive postgresql_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_postgresql_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_postgresql_server_packets'($*)) dnl
-
- corenet_send_postgresql_server_packets($1)
- corenet_receive_postgresql_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_postgresql_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive postgresql_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_postgresql_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_postgresql_server_packets'($*)) dnl
-
- corenet_dontaudit_send_postgresql_server_packets($1)
- corenet_dontaudit_receive_postgresql_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_postgresql_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to postgresql_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_postgresql_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_postgresql_server_packets'($*)) dnl
-
- gen_require(`
- type postgresql_server_packet_t;
- ')
-
- allow $1 postgresql_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_postgresql_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the postgrey port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_postgrey_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_postgrey_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_postgrey_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the postgrey port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_postgrey_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_postgrey_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_postgrey_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the postgrey port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_postgrey_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_postgrey_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_postgrey_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the postgrey port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_postgrey_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_postgrey_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_postgrey_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the postgrey port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_postgrey_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_postgrey_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_postgrey_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the postgrey port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_postgrey_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_postgrey_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_postgrey_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the postgrey port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_postgrey_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_postgrey_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_postgrey_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the postgrey port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_postgrey_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_postgrey_port'($*)) dnl
-
- gen_require(`
- type postgrey_port_t;
- ')
-
- allow $1 postgrey_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_postgrey_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the postgrey port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_postgrey_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_postgrey_port'($*)) dnl
-
- gen_require(`
- type postgrey_port_t;
- ')
-
- allow $1 postgrey_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_postgrey_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the postgrey port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_postgrey_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_postgrey_port'($*)) dnl
-
- gen_require(`
- type postgrey_port_t;
- ')
-
- allow $1 postgrey_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_postgrey_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send postgrey_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_postgrey_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_postgrey_client_packets'($*)) dnl
-
- gen_require(`
- type postgrey_client_packet_t;
- ')
-
- allow $1 postgrey_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_postgrey_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send postgrey_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_postgrey_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_postgrey_client_packets'($*)) dnl
-
- gen_require(`
- type postgrey_client_packet_t;
- ')
-
- dontaudit $1 postgrey_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_postgrey_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive postgrey_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_postgrey_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_postgrey_client_packets'($*)) dnl
-
- gen_require(`
- type postgrey_client_packet_t;
- ')
-
- allow $1 postgrey_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_postgrey_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive postgrey_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_postgrey_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_postgrey_client_packets'($*)) dnl
-
- gen_require(`
- type postgrey_client_packet_t;
- ')
-
- dontaudit $1 postgrey_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_postgrey_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive postgrey_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_postgrey_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_postgrey_client_packets'($*)) dnl
-
- corenet_send_postgrey_client_packets($1)
- corenet_receive_postgrey_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_postgrey_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive postgrey_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_postgrey_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_postgrey_client_packets'($*)) dnl
-
- corenet_dontaudit_send_postgrey_client_packets($1)
- corenet_dontaudit_receive_postgrey_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_postgrey_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to postgrey_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_postgrey_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_postgrey_client_packets'($*)) dnl
-
- gen_require(`
- type postgrey_client_packet_t;
- ')
-
- allow $1 postgrey_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_postgrey_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send postgrey_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_postgrey_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_postgrey_server_packets'($*)) dnl
-
- gen_require(`
- type postgrey_server_packet_t;
- ')
-
- allow $1 postgrey_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_postgrey_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send postgrey_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_postgrey_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_postgrey_server_packets'($*)) dnl
-
- gen_require(`
- type postgrey_server_packet_t;
- ')
-
- dontaudit $1 postgrey_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_postgrey_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive postgrey_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_postgrey_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_postgrey_server_packets'($*)) dnl
-
- gen_require(`
- type postgrey_server_packet_t;
- ')
-
- allow $1 postgrey_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_postgrey_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive postgrey_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_postgrey_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_postgrey_server_packets'($*)) dnl
-
- gen_require(`
- type postgrey_server_packet_t;
- ')
-
- dontaudit $1 postgrey_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_postgrey_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive postgrey_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_postgrey_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_postgrey_server_packets'($*)) dnl
-
- corenet_send_postgrey_server_packets($1)
- corenet_receive_postgrey_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_postgrey_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive postgrey_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_postgrey_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_postgrey_server_packets'($*)) dnl
-
- corenet_dontaudit_send_postgrey_server_packets($1)
- corenet_dontaudit_receive_postgrey_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_postgrey_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to postgrey_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_postgrey_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_postgrey_server_packets'($*)) dnl
-
- gen_require(`
- type postgrey_server_packet_t;
- ')
-
- allow $1 postgrey_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_postgrey_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the pptp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_pptp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_pptp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_pptp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the pptp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_pptp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_pptp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_pptp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the pptp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_pptp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_pptp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_pptp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the pptp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_pptp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_pptp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_pptp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the pptp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_pptp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_pptp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_pptp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the pptp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_pptp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_pptp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_pptp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the pptp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_pptp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_pptp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_pptp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the pptp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_pptp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_pptp_port'($*)) dnl
-
- gen_require(`
- type pptp_port_t;
- ')
-
- allow $1 pptp_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_pptp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the pptp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_pptp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_pptp_port'($*)) dnl
-
- gen_require(`
- type pptp_port_t;
- ')
-
- allow $1 pptp_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_pptp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the pptp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_pptp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_pptp_port'($*)) dnl
-
- gen_require(`
- type pptp_port_t;
- ')
-
- allow $1 pptp_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_pptp_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send pptp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_pptp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_pptp_client_packets'($*)) dnl
-
- gen_require(`
- type pptp_client_packet_t;
- ')
-
- allow $1 pptp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_pptp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send pptp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_pptp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pptp_client_packets'($*)) dnl
-
- gen_require(`
- type pptp_client_packet_t;
- ')
-
- dontaudit $1 pptp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pptp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive pptp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_pptp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_pptp_client_packets'($*)) dnl
-
- gen_require(`
- type pptp_client_packet_t;
- ')
-
- allow $1 pptp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_pptp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive pptp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_pptp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pptp_client_packets'($*)) dnl
-
- gen_require(`
- type pptp_client_packet_t;
- ')
-
- dontaudit $1 pptp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pptp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive pptp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_pptp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pptp_client_packets'($*)) dnl
-
- corenet_send_pptp_client_packets($1)
- corenet_receive_pptp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pptp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive pptp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_pptp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pptp_client_packets'($*)) dnl
-
- corenet_dontaudit_send_pptp_client_packets($1)
- corenet_dontaudit_receive_pptp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pptp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to pptp_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_pptp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pptp_client_packets'($*)) dnl
-
- gen_require(`
- type pptp_client_packet_t;
- ')
-
- allow $1 pptp_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_pptp_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send pptp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_pptp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_pptp_server_packets'($*)) dnl
-
- gen_require(`
- type pptp_server_packet_t;
- ')
-
- allow $1 pptp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_pptp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send pptp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_pptp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pptp_server_packets'($*)) dnl
-
- gen_require(`
- type pptp_server_packet_t;
- ')
-
- dontaudit $1 pptp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pptp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive pptp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_pptp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_pptp_server_packets'($*)) dnl
-
- gen_require(`
- type pptp_server_packet_t;
- ')
-
- allow $1 pptp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_pptp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive pptp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_pptp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pptp_server_packets'($*)) dnl
-
- gen_require(`
- type pptp_server_packet_t;
- ')
-
- dontaudit $1 pptp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pptp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive pptp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_pptp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pptp_server_packets'($*)) dnl
-
- corenet_send_pptp_server_packets($1)
- corenet_receive_pptp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pptp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive pptp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_pptp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pptp_server_packets'($*)) dnl
-
- corenet_dontaudit_send_pptp_server_packets($1)
- corenet_dontaudit_receive_pptp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pptp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to pptp_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_pptp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pptp_server_packets'($*)) dnl
-
- gen_require(`
- type pptp_server_packet_t;
- ')
-
- allow $1 pptp_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_pptp_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the prelude port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_prelude_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_prelude_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_prelude_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the prelude port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_prelude_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_prelude_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_prelude_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the prelude port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_prelude_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_prelude_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_prelude_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the prelude port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_prelude_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_prelude_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_prelude_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the prelude port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_prelude_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_prelude_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_prelude_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the prelude port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_prelude_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_prelude_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_prelude_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the prelude port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_prelude_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_prelude_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_prelude_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the prelude port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_prelude_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_prelude_port'($*)) dnl
-
- gen_require(`
- type prelude_port_t;
- ')
-
- allow $1 prelude_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_prelude_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the prelude port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_prelude_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_prelude_port'($*)) dnl
-
- gen_require(`
- type prelude_port_t;
- ')
-
- allow $1 prelude_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_prelude_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the prelude port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_prelude_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_prelude_port'($*)) dnl
-
- gen_require(`
- type prelude_port_t;
- ')
-
- allow $1 prelude_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_prelude_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send prelude_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_prelude_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_prelude_client_packets'($*)) dnl
-
- gen_require(`
- type prelude_client_packet_t;
- ')
-
- allow $1 prelude_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_prelude_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send prelude_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_prelude_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_prelude_client_packets'($*)) dnl
-
- gen_require(`
- type prelude_client_packet_t;
- ')
-
- dontaudit $1 prelude_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_prelude_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive prelude_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_prelude_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_prelude_client_packets'($*)) dnl
-
- gen_require(`
- type prelude_client_packet_t;
- ')
-
- allow $1 prelude_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_prelude_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive prelude_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_prelude_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_prelude_client_packets'($*)) dnl
-
- gen_require(`
- type prelude_client_packet_t;
- ')
-
- dontaudit $1 prelude_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_prelude_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive prelude_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_prelude_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_prelude_client_packets'($*)) dnl
-
- corenet_send_prelude_client_packets($1)
- corenet_receive_prelude_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_prelude_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive prelude_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_prelude_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_prelude_client_packets'($*)) dnl
-
- corenet_dontaudit_send_prelude_client_packets($1)
- corenet_dontaudit_receive_prelude_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_prelude_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to prelude_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_prelude_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_prelude_client_packets'($*)) dnl
-
- gen_require(`
- type prelude_client_packet_t;
- ')
-
- allow $1 prelude_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_prelude_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send prelude_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_prelude_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_prelude_server_packets'($*)) dnl
-
- gen_require(`
- type prelude_server_packet_t;
- ')
-
- allow $1 prelude_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_prelude_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send prelude_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_prelude_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_prelude_server_packets'($*)) dnl
-
- gen_require(`
- type prelude_server_packet_t;
- ')
-
- dontaudit $1 prelude_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_prelude_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive prelude_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_prelude_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_prelude_server_packets'($*)) dnl
-
- gen_require(`
- type prelude_server_packet_t;
- ')
-
- allow $1 prelude_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_prelude_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive prelude_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_prelude_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_prelude_server_packets'($*)) dnl
-
- gen_require(`
- type prelude_server_packet_t;
- ')
-
- dontaudit $1 prelude_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_prelude_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive prelude_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_prelude_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_prelude_server_packets'($*)) dnl
-
- corenet_send_prelude_server_packets($1)
- corenet_receive_prelude_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_prelude_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive prelude_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_prelude_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_prelude_server_packets'($*)) dnl
-
- corenet_dontaudit_send_prelude_server_packets($1)
- corenet_dontaudit_receive_prelude_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_prelude_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to prelude_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_prelude_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_prelude_server_packets'($*)) dnl
-
- gen_require(`
- type prelude_server_packet_t;
- ')
-
- allow $1 prelude_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_prelude_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the presence port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_presence_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_presence_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_presence_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the presence port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_presence_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_presence_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_presence_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the presence port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_presence_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_presence_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_presence_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the presence port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_presence_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_presence_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_presence_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the presence port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_presence_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_presence_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_presence_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the presence port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_presence_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_presence_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_presence_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the presence port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_presence_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_presence_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_presence_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the presence port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_presence_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_presence_port'($*)) dnl
-
- gen_require(`
- type presence_port_t;
- ')
-
- allow $1 presence_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_presence_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the presence port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_presence_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_presence_port'($*)) dnl
-
- gen_require(`
- type presence_port_t;
- ')
-
- allow $1 presence_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_presence_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the presence port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_presence_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_presence_port'($*)) dnl
-
- gen_require(`
- type presence_port_t;
- ')
-
- allow $1 presence_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_presence_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send presence_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_presence_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_presence_client_packets'($*)) dnl
-
- gen_require(`
- type presence_client_packet_t;
- ')
-
- allow $1 presence_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_presence_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send presence_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_presence_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_presence_client_packets'($*)) dnl
-
- gen_require(`
- type presence_client_packet_t;
- ')
-
- dontaudit $1 presence_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_presence_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive presence_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_presence_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_presence_client_packets'($*)) dnl
-
- gen_require(`
- type presence_client_packet_t;
- ')
-
- allow $1 presence_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_presence_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive presence_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_presence_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_presence_client_packets'($*)) dnl
-
- gen_require(`
- type presence_client_packet_t;
- ')
-
- dontaudit $1 presence_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_presence_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive presence_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_presence_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_presence_client_packets'($*)) dnl
-
- corenet_send_presence_client_packets($1)
- corenet_receive_presence_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_presence_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive presence_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_presence_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_presence_client_packets'($*)) dnl
-
- corenet_dontaudit_send_presence_client_packets($1)
- corenet_dontaudit_receive_presence_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_presence_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to presence_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_presence_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_presence_client_packets'($*)) dnl
-
- gen_require(`
- type presence_client_packet_t;
- ')
-
- allow $1 presence_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_presence_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send presence_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_presence_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_presence_server_packets'($*)) dnl
-
- gen_require(`
- type presence_server_packet_t;
- ')
-
- allow $1 presence_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_presence_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send presence_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_presence_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_presence_server_packets'($*)) dnl
-
- gen_require(`
- type presence_server_packet_t;
- ')
-
- dontaudit $1 presence_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_presence_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive presence_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_presence_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_presence_server_packets'($*)) dnl
-
- gen_require(`
- type presence_server_packet_t;
- ')
-
- allow $1 presence_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_presence_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive presence_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_presence_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_presence_server_packets'($*)) dnl
-
- gen_require(`
- type presence_server_packet_t;
- ')
-
- dontaudit $1 presence_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_presence_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive presence_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_presence_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_presence_server_packets'($*)) dnl
-
- corenet_send_presence_server_packets($1)
- corenet_receive_presence_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_presence_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive presence_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_presence_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_presence_server_packets'($*)) dnl
-
- corenet_dontaudit_send_presence_server_packets($1)
- corenet_dontaudit_receive_presence_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_presence_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to presence_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_presence_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_presence_server_packets'($*)) dnl
-
- gen_require(`
- type presence_server_packet_t;
- ')
-
- allow $1 presence_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_presence_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the printer port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_printer_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_printer_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_printer_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the printer port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_printer_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_printer_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_printer_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the printer port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_printer_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_printer_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_printer_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the printer port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_printer_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_printer_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_printer_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the printer port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_printer_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_printer_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_printer_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the printer port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_printer_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_printer_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_printer_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the printer port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_printer_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_printer_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_printer_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the printer port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_printer_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_printer_port'($*)) dnl
-
- gen_require(`
- type printer_port_t;
- ')
-
- allow $1 printer_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_printer_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the printer port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_printer_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_printer_port'($*)) dnl
-
- gen_require(`
- type printer_port_t;
- ')
-
- allow $1 printer_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_printer_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the printer port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_printer_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_printer_port'($*)) dnl
-
- gen_require(`
- type printer_port_t;
- ')
-
- allow $1 printer_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_printer_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send printer_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_printer_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_printer_client_packets'($*)) dnl
-
- gen_require(`
- type printer_client_packet_t;
- ')
-
- allow $1 printer_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_printer_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send printer_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_printer_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_printer_client_packets'($*)) dnl
-
- gen_require(`
- type printer_client_packet_t;
- ')
-
- dontaudit $1 printer_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_printer_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive printer_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_printer_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_printer_client_packets'($*)) dnl
-
- gen_require(`
- type printer_client_packet_t;
- ')
-
- allow $1 printer_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_printer_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive printer_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_printer_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_printer_client_packets'($*)) dnl
-
- gen_require(`
- type printer_client_packet_t;
- ')
-
- dontaudit $1 printer_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_printer_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive printer_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_printer_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_printer_client_packets'($*)) dnl
-
- corenet_send_printer_client_packets($1)
- corenet_receive_printer_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_printer_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive printer_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_printer_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_printer_client_packets'($*)) dnl
-
- corenet_dontaudit_send_printer_client_packets($1)
- corenet_dontaudit_receive_printer_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_printer_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to printer_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_printer_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_printer_client_packets'($*)) dnl
-
- gen_require(`
- type printer_client_packet_t;
- ')
-
- allow $1 printer_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_printer_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send printer_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_printer_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_printer_server_packets'($*)) dnl
-
- gen_require(`
- type printer_server_packet_t;
- ')
-
- allow $1 printer_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_printer_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send printer_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_printer_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_printer_server_packets'($*)) dnl
-
- gen_require(`
- type printer_server_packet_t;
- ')
-
- dontaudit $1 printer_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_printer_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive printer_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_printer_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_printer_server_packets'($*)) dnl
-
- gen_require(`
- type printer_server_packet_t;
- ')
-
- allow $1 printer_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_printer_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive printer_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_printer_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_printer_server_packets'($*)) dnl
-
- gen_require(`
- type printer_server_packet_t;
- ')
-
- dontaudit $1 printer_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_printer_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive printer_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_printer_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_printer_server_packets'($*)) dnl
-
- corenet_send_printer_server_packets($1)
- corenet_receive_printer_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_printer_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive printer_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_printer_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_printer_server_packets'($*)) dnl
-
- corenet_dontaudit_send_printer_server_packets($1)
- corenet_dontaudit_receive_printer_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_printer_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to printer_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_printer_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_printer_server_packets'($*)) dnl
-
- gen_require(`
- type printer_server_packet_t;
- ')
-
- allow $1 printer_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_printer_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the ptal port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_ptal_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ptal_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ptal_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the ptal port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_ptal_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ptal_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_ptal_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the ptal port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_ptal_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ptal_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ptal_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the ptal port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_ptal_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ptal_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ptal_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the ptal port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_ptal_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ptal_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ptal_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the ptal port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_ptal_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ptal_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ptal_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the ptal port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_ptal_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ptal_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ptal_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the ptal port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_ptal_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ptal_port'($*)) dnl
-
- gen_require(`
- type ptal_port_t;
- ')
-
- allow $1 ptal_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ptal_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the ptal port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_ptal_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ptal_port'($*)) dnl
-
- gen_require(`
- type ptal_port_t;
- ')
-
- allow $1 ptal_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ptal_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the ptal port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_ptal_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ptal_port'($*)) dnl
-
- gen_require(`
- type ptal_port_t;
- ')
-
- allow $1 ptal_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ptal_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ptal_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ptal_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ptal_client_packets'($*)) dnl
-
- gen_require(`
- type ptal_client_packet_t;
- ')
-
- allow $1 ptal_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ptal_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ptal_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ptal_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ptal_client_packets'($*)) dnl
-
- gen_require(`
- type ptal_client_packet_t;
- ')
-
- dontaudit $1 ptal_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ptal_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ptal_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ptal_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ptal_client_packets'($*)) dnl
-
- gen_require(`
- type ptal_client_packet_t;
- ')
-
- allow $1 ptal_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ptal_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ptal_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ptal_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ptal_client_packets'($*)) dnl
-
- gen_require(`
- type ptal_client_packet_t;
- ')
-
- dontaudit $1 ptal_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ptal_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ptal_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ptal_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ptal_client_packets'($*)) dnl
-
- corenet_send_ptal_client_packets($1)
- corenet_receive_ptal_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ptal_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ptal_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ptal_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ptal_client_packets'($*)) dnl
-
- corenet_dontaudit_send_ptal_client_packets($1)
- corenet_dontaudit_receive_ptal_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ptal_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ptal_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ptal_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ptal_client_packets'($*)) dnl
-
- gen_require(`
- type ptal_client_packet_t;
- ')
-
- allow $1 ptal_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ptal_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ptal_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ptal_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ptal_server_packets'($*)) dnl
-
- gen_require(`
- type ptal_server_packet_t;
- ')
-
- allow $1 ptal_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ptal_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ptal_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ptal_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ptal_server_packets'($*)) dnl
-
- gen_require(`
- type ptal_server_packet_t;
- ')
-
- dontaudit $1 ptal_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ptal_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ptal_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ptal_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ptal_server_packets'($*)) dnl
-
- gen_require(`
- type ptal_server_packet_t;
- ')
-
- allow $1 ptal_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ptal_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ptal_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ptal_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ptal_server_packets'($*)) dnl
-
- gen_require(`
- type ptal_server_packet_t;
- ')
-
- dontaudit $1 ptal_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ptal_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ptal_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ptal_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ptal_server_packets'($*)) dnl
-
- corenet_send_ptal_server_packets($1)
- corenet_receive_ptal_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ptal_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ptal_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ptal_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ptal_server_packets'($*)) dnl
-
- corenet_dontaudit_send_ptal_server_packets($1)
- corenet_dontaudit_receive_ptal_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ptal_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ptal_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ptal_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ptal_server_packets'($*)) dnl
-
- gen_require(`
- type ptal_server_packet_t;
- ')
-
- allow $1 ptal_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ptal_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the pulseaudio port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_pulseaudio_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_pulseaudio_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_pulseaudio_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the pulseaudio port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_pulseaudio_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_pulseaudio_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_pulseaudio_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the pulseaudio port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_pulseaudio_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_pulseaudio_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_pulseaudio_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the pulseaudio port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_pulseaudio_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_pulseaudio_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_pulseaudio_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the pulseaudio port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_pulseaudio_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_pulseaudio_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_pulseaudio_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the pulseaudio port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_pulseaudio_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_pulseaudio_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_pulseaudio_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the pulseaudio port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_pulseaudio_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_pulseaudio_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_pulseaudio_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the pulseaudio port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_pulseaudio_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_pulseaudio_port'($*)) dnl
-
- gen_require(`
- type pulseaudio_port_t;
- ')
-
- allow $1 pulseaudio_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_pulseaudio_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the pulseaudio port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_pulseaudio_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_pulseaudio_port'($*)) dnl
-
- gen_require(`
- type pulseaudio_port_t;
- ')
-
- allow $1 pulseaudio_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_pulseaudio_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the pulseaudio port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_pulseaudio_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_pulseaudio_port'($*)) dnl
-
- gen_require(`
- type pulseaudio_port_t;
- ')
-
- allow $1 pulseaudio_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_pulseaudio_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send pulseaudio_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_pulseaudio_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_pulseaudio_client_packets'($*)) dnl
-
- gen_require(`
- type pulseaudio_client_packet_t;
- ')
-
- allow $1 pulseaudio_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_pulseaudio_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send pulseaudio_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_pulseaudio_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pulseaudio_client_packets'($*)) dnl
-
- gen_require(`
- type pulseaudio_client_packet_t;
- ')
-
- dontaudit $1 pulseaudio_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pulseaudio_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive pulseaudio_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_pulseaudio_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_pulseaudio_client_packets'($*)) dnl
-
- gen_require(`
- type pulseaudio_client_packet_t;
- ')
-
- allow $1 pulseaudio_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_pulseaudio_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive pulseaudio_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_pulseaudio_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pulseaudio_client_packets'($*)) dnl
-
- gen_require(`
- type pulseaudio_client_packet_t;
- ')
-
- dontaudit $1 pulseaudio_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pulseaudio_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive pulseaudio_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_pulseaudio_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pulseaudio_client_packets'($*)) dnl
-
- corenet_send_pulseaudio_client_packets($1)
- corenet_receive_pulseaudio_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pulseaudio_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive pulseaudio_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_pulseaudio_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pulseaudio_client_packets'($*)) dnl
-
- corenet_dontaudit_send_pulseaudio_client_packets($1)
- corenet_dontaudit_receive_pulseaudio_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pulseaudio_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to pulseaudio_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_pulseaudio_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pulseaudio_client_packets'($*)) dnl
-
- gen_require(`
- type pulseaudio_client_packet_t;
- ')
-
- allow $1 pulseaudio_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_pulseaudio_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send pulseaudio_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_pulseaudio_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_pulseaudio_server_packets'($*)) dnl
-
- gen_require(`
- type pulseaudio_server_packet_t;
- ')
-
- allow $1 pulseaudio_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_pulseaudio_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send pulseaudio_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_pulseaudio_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pulseaudio_server_packets'($*)) dnl
-
- gen_require(`
- type pulseaudio_server_packet_t;
- ')
-
- dontaudit $1 pulseaudio_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pulseaudio_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive pulseaudio_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_pulseaudio_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_pulseaudio_server_packets'($*)) dnl
-
- gen_require(`
- type pulseaudio_server_packet_t;
- ')
-
- allow $1 pulseaudio_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_pulseaudio_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive pulseaudio_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_pulseaudio_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pulseaudio_server_packets'($*)) dnl
-
- gen_require(`
- type pulseaudio_server_packet_t;
- ')
-
- dontaudit $1 pulseaudio_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pulseaudio_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive pulseaudio_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_pulseaudio_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pulseaudio_server_packets'($*)) dnl
-
- corenet_send_pulseaudio_server_packets($1)
- corenet_receive_pulseaudio_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pulseaudio_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive pulseaudio_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_pulseaudio_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pulseaudio_server_packets'($*)) dnl
-
- corenet_dontaudit_send_pulseaudio_server_packets($1)
- corenet_dontaudit_receive_pulseaudio_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pulseaudio_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to pulseaudio_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_pulseaudio_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pulseaudio_server_packets'($*)) dnl
-
- gen_require(`
- type pulseaudio_server_packet_t;
- ')
-
- allow $1 pulseaudio_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_pulseaudio_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the puppet port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_puppet_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_puppet_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_puppet_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the puppet port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_puppet_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_puppet_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_puppet_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the puppet port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_puppet_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_puppet_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_puppet_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the puppet port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_puppet_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_puppet_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_puppet_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the puppet port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_puppet_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_puppet_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_puppet_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the puppet port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_puppet_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_puppet_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_puppet_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the puppet port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_puppet_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_puppet_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_puppet_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the puppet port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_puppet_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_puppet_port'($*)) dnl
-
- gen_require(`
- type puppet_port_t;
- ')
-
- allow $1 puppet_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_puppet_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the puppet port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_puppet_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_puppet_port'($*)) dnl
-
- gen_require(`
- type puppet_port_t;
- ')
-
- allow $1 puppet_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_puppet_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the puppet port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_puppet_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_puppet_port'($*)) dnl
-
- gen_require(`
- type puppet_port_t;
- ')
-
- allow $1 puppet_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_puppet_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send puppet_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_puppet_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_puppet_client_packets'($*)) dnl
-
- gen_require(`
- type puppet_client_packet_t;
- ')
-
- allow $1 puppet_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_puppet_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send puppet_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_puppet_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_puppet_client_packets'($*)) dnl
-
- gen_require(`
- type puppet_client_packet_t;
- ')
-
- dontaudit $1 puppet_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_puppet_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive puppet_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_puppet_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_puppet_client_packets'($*)) dnl
-
- gen_require(`
- type puppet_client_packet_t;
- ')
-
- allow $1 puppet_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_puppet_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive puppet_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_puppet_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_puppet_client_packets'($*)) dnl
-
- gen_require(`
- type puppet_client_packet_t;
- ')
-
- dontaudit $1 puppet_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_puppet_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive puppet_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_puppet_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_puppet_client_packets'($*)) dnl
-
- corenet_send_puppet_client_packets($1)
- corenet_receive_puppet_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_puppet_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive puppet_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_puppet_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_puppet_client_packets'($*)) dnl
-
- corenet_dontaudit_send_puppet_client_packets($1)
- corenet_dontaudit_receive_puppet_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_puppet_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to puppet_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_puppet_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_puppet_client_packets'($*)) dnl
-
- gen_require(`
- type puppet_client_packet_t;
- ')
-
- allow $1 puppet_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_puppet_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send puppet_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_puppet_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_puppet_server_packets'($*)) dnl
-
- gen_require(`
- type puppet_server_packet_t;
- ')
-
- allow $1 puppet_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_puppet_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send puppet_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_puppet_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_puppet_server_packets'($*)) dnl
-
- gen_require(`
- type puppet_server_packet_t;
- ')
-
- dontaudit $1 puppet_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_puppet_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive puppet_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_puppet_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_puppet_server_packets'($*)) dnl
-
- gen_require(`
- type puppet_server_packet_t;
- ')
-
- allow $1 puppet_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_puppet_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive puppet_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_puppet_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_puppet_server_packets'($*)) dnl
-
- gen_require(`
- type puppet_server_packet_t;
- ')
-
- dontaudit $1 puppet_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_puppet_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive puppet_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_puppet_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_puppet_server_packets'($*)) dnl
-
- corenet_send_puppet_server_packets($1)
- corenet_receive_puppet_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_puppet_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive puppet_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_puppet_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_puppet_server_packets'($*)) dnl
-
- corenet_dontaudit_send_puppet_server_packets($1)
- corenet_dontaudit_receive_puppet_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_puppet_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to puppet_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_puppet_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_puppet_server_packets'($*)) dnl
-
- gen_require(`
- type puppet_server_packet_t;
- ')
-
- allow $1 puppet_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_puppet_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the puppetclient port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_puppetclient_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_puppetclient_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_puppetclient_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the puppetclient port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_puppetclient_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_puppetclient_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_puppetclient_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the puppetclient port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_puppetclient_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_puppetclient_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_puppetclient_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the puppetclient port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_puppetclient_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_puppetclient_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_puppetclient_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the puppetclient port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_puppetclient_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_puppetclient_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_puppetclient_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the puppetclient port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_puppetclient_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_puppetclient_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_puppetclient_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the puppetclient port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_puppetclient_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_puppetclient_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_puppetclient_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the puppetclient port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_puppetclient_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_puppetclient_port'($*)) dnl
-
- gen_require(`
- type puppetclient_port_t;
- ')
-
- allow $1 puppetclient_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_puppetclient_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the puppetclient port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_puppetclient_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_puppetclient_port'($*)) dnl
-
- gen_require(`
- type puppetclient_port_t;
- ')
-
- allow $1 puppetclient_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_puppetclient_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the puppetclient port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_puppetclient_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_puppetclient_port'($*)) dnl
-
- gen_require(`
- type puppetclient_port_t;
- ')
-
- allow $1 puppetclient_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_puppetclient_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send puppetclient_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_puppetclient_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_puppetclient_client_packets'($*)) dnl
-
- gen_require(`
- type puppetclient_client_packet_t;
- ')
-
- allow $1 puppetclient_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_puppetclient_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send puppetclient_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_puppetclient_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_puppetclient_client_packets'($*)) dnl
-
- gen_require(`
- type puppetclient_client_packet_t;
- ')
-
- dontaudit $1 puppetclient_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_puppetclient_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive puppetclient_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_puppetclient_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_puppetclient_client_packets'($*)) dnl
-
- gen_require(`
- type puppetclient_client_packet_t;
- ')
-
- allow $1 puppetclient_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_puppetclient_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive puppetclient_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_puppetclient_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_puppetclient_client_packets'($*)) dnl
-
- gen_require(`
- type puppetclient_client_packet_t;
- ')
-
- dontaudit $1 puppetclient_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_puppetclient_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive puppetclient_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_puppetclient_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_puppetclient_client_packets'($*)) dnl
-
- corenet_send_puppetclient_client_packets($1)
- corenet_receive_puppetclient_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_puppetclient_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive puppetclient_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_puppetclient_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_puppetclient_client_packets'($*)) dnl
-
- corenet_dontaudit_send_puppetclient_client_packets($1)
- corenet_dontaudit_receive_puppetclient_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_puppetclient_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to puppetclient_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_puppetclient_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_puppetclient_client_packets'($*)) dnl
-
- gen_require(`
- type puppetclient_client_packet_t;
- ')
-
- allow $1 puppetclient_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_puppetclient_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send puppetclient_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_puppetclient_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_puppetclient_server_packets'($*)) dnl
-
- gen_require(`
- type puppetclient_server_packet_t;
- ')
-
- allow $1 puppetclient_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_puppetclient_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send puppetclient_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_puppetclient_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_puppetclient_server_packets'($*)) dnl
-
- gen_require(`
- type puppetclient_server_packet_t;
- ')
-
- dontaudit $1 puppetclient_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_puppetclient_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive puppetclient_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_puppetclient_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_puppetclient_server_packets'($*)) dnl
-
- gen_require(`
- type puppetclient_server_packet_t;
- ')
-
- allow $1 puppetclient_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_puppetclient_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive puppetclient_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_puppetclient_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_puppetclient_server_packets'($*)) dnl
-
- gen_require(`
- type puppetclient_server_packet_t;
- ')
-
- dontaudit $1 puppetclient_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_puppetclient_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive puppetclient_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_puppetclient_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_puppetclient_server_packets'($*)) dnl
-
- corenet_send_puppetclient_server_packets($1)
- corenet_receive_puppetclient_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_puppetclient_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive puppetclient_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_puppetclient_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_puppetclient_server_packets'($*)) dnl
-
- corenet_dontaudit_send_puppetclient_server_packets($1)
- corenet_dontaudit_receive_puppetclient_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_puppetclient_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to puppetclient_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_puppetclient_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_puppetclient_server_packets'($*)) dnl
-
- gen_require(`
- type puppetclient_server_packet_t;
- ')
-
- allow $1 puppetclient_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_puppetclient_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the pxe port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_pxe_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_pxe_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_pxe_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the pxe port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_pxe_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_pxe_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_pxe_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the pxe port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_pxe_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_pxe_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_pxe_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the pxe port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_pxe_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_pxe_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_pxe_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the pxe port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_pxe_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_pxe_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_pxe_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the pxe port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_pxe_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_pxe_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_pxe_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the pxe port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_pxe_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_pxe_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_pxe_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the pxe port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_pxe_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_pxe_port'($*)) dnl
-
- gen_require(`
- type pxe_port_t;
- ')
-
- allow $1 pxe_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_pxe_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the pxe port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_pxe_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_pxe_port'($*)) dnl
-
- gen_require(`
- type pxe_port_t;
- ')
-
- allow $1 pxe_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_pxe_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the pxe port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_pxe_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_pxe_port'($*)) dnl
-
- gen_require(`
- type pxe_port_t;
- ')
-
- allow $1 pxe_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_pxe_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send pxe_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_pxe_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_pxe_client_packets'($*)) dnl
-
- gen_require(`
- type pxe_client_packet_t;
- ')
-
- allow $1 pxe_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_pxe_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send pxe_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_pxe_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pxe_client_packets'($*)) dnl
-
- gen_require(`
- type pxe_client_packet_t;
- ')
-
- dontaudit $1 pxe_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pxe_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive pxe_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_pxe_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_pxe_client_packets'($*)) dnl
-
- gen_require(`
- type pxe_client_packet_t;
- ')
-
- allow $1 pxe_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_pxe_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive pxe_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_pxe_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pxe_client_packets'($*)) dnl
-
- gen_require(`
- type pxe_client_packet_t;
- ')
-
- dontaudit $1 pxe_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pxe_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive pxe_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_pxe_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pxe_client_packets'($*)) dnl
-
- corenet_send_pxe_client_packets($1)
- corenet_receive_pxe_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pxe_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive pxe_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_pxe_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pxe_client_packets'($*)) dnl
-
- corenet_dontaudit_send_pxe_client_packets($1)
- corenet_dontaudit_receive_pxe_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pxe_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to pxe_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_pxe_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pxe_client_packets'($*)) dnl
-
- gen_require(`
- type pxe_client_packet_t;
- ')
-
- allow $1 pxe_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_pxe_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send pxe_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_pxe_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_pxe_server_packets'($*)) dnl
-
- gen_require(`
- type pxe_server_packet_t;
- ')
-
- allow $1 pxe_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_pxe_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send pxe_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_pxe_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pxe_server_packets'($*)) dnl
-
- gen_require(`
- type pxe_server_packet_t;
- ')
-
- dontaudit $1 pxe_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pxe_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive pxe_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_pxe_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_pxe_server_packets'($*)) dnl
-
- gen_require(`
- type pxe_server_packet_t;
- ')
-
- allow $1 pxe_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_pxe_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive pxe_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_pxe_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pxe_server_packets'($*)) dnl
-
- gen_require(`
- type pxe_server_packet_t;
- ')
-
- dontaudit $1 pxe_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pxe_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive pxe_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_pxe_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pxe_server_packets'($*)) dnl
-
- corenet_send_pxe_server_packets($1)
- corenet_receive_pxe_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pxe_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive pxe_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_pxe_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pxe_server_packets'($*)) dnl
-
- corenet_dontaudit_send_pxe_server_packets($1)
- corenet_dontaudit_receive_pxe_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pxe_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to pxe_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_pxe_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pxe_server_packets'($*)) dnl
-
- gen_require(`
- type pxe_server_packet_t;
- ')
-
- allow $1 pxe_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_pxe_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the pyzor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_pyzor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_pyzor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_pyzor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the pyzor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_pyzor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_pyzor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_pyzor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the pyzor port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_pyzor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_pyzor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_pyzor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the pyzor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_pyzor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_pyzor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_pyzor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the pyzor port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_pyzor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_pyzor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_pyzor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the pyzor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_pyzor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_pyzor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_pyzor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the pyzor port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_pyzor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_pyzor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_pyzor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the pyzor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_pyzor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_pyzor_port'($*)) dnl
-
- gen_require(`
- type pyzor_port_t;
- ')
-
- allow $1 pyzor_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_pyzor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the pyzor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_pyzor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_pyzor_port'($*)) dnl
-
- gen_require(`
- type pyzor_port_t;
- ')
-
- allow $1 pyzor_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_pyzor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the pyzor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_pyzor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_pyzor_port'($*)) dnl
-
- gen_require(`
- type pyzor_port_t;
- ')
-
- allow $1 pyzor_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_pyzor_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send pyzor_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_pyzor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_pyzor_client_packets'($*)) dnl
-
- gen_require(`
- type pyzor_client_packet_t;
- ')
-
- allow $1 pyzor_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_pyzor_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send pyzor_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_pyzor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pyzor_client_packets'($*)) dnl
-
- gen_require(`
- type pyzor_client_packet_t;
- ')
-
- dontaudit $1 pyzor_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pyzor_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive pyzor_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_pyzor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_pyzor_client_packets'($*)) dnl
-
- gen_require(`
- type pyzor_client_packet_t;
- ')
-
- allow $1 pyzor_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_pyzor_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive pyzor_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_pyzor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pyzor_client_packets'($*)) dnl
-
- gen_require(`
- type pyzor_client_packet_t;
- ')
-
- dontaudit $1 pyzor_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pyzor_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive pyzor_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_pyzor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pyzor_client_packets'($*)) dnl
-
- corenet_send_pyzor_client_packets($1)
- corenet_receive_pyzor_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pyzor_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive pyzor_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_pyzor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pyzor_client_packets'($*)) dnl
-
- corenet_dontaudit_send_pyzor_client_packets($1)
- corenet_dontaudit_receive_pyzor_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pyzor_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to pyzor_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_pyzor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pyzor_client_packets'($*)) dnl
-
- gen_require(`
- type pyzor_client_packet_t;
- ')
-
- allow $1 pyzor_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_pyzor_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send pyzor_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_pyzor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_pyzor_server_packets'($*)) dnl
-
- gen_require(`
- type pyzor_server_packet_t;
- ')
-
- allow $1 pyzor_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_pyzor_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send pyzor_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_pyzor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pyzor_server_packets'($*)) dnl
-
- gen_require(`
- type pyzor_server_packet_t;
- ')
-
- dontaudit $1 pyzor_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pyzor_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive pyzor_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_pyzor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_pyzor_server_packets'($*)) dnl
-
- gen_require(`
- type pyzor_server_packet_t;
- ')
-
- allow $1 pyzor_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_pyzor_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive pyzor_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_pyzor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pyzor_server_packets'($*)) dnl
-
- gen_require(`
- type pyzor_server_packet_t;
- ')
-
- dontaudit $1 pyzor_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pyzor_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive pyzor_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_pyzor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pyzor_server_packets'($*)) dnl
-
- corenet_send_pyzor_server_packets($1)
- corenet_receive_pyzor_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pyzor_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive pyzor_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_pyzor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pyzor_server_packets'($*)) dnl
-
- corenet_dontaudit_send_pyzor_server_packets($1)
- corenet_dontaudit_receive_pyzor_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pyzor_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to pyzor_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_pyzor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pyzor_server_packets'($*)) dnl
-
- gen_require(`
- type pyzor_server_packet_t;
- ')
-
- allow $1 pyzor_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_pyzor_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the radacct port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_radacct_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_radacct_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_radacct_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the radacct port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_radacct_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_radacct_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_radacct_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the radacct port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_radacct_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_radacct_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_radacct_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the radacct port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_radacct_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_radacct_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_radacct_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the radacct port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_radacct_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_radacct_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_radacct_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the radacct port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_radacct_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_radacct_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_radacct_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the radacct port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_radacct_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_radacct_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_radacct_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the radacct port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_radacct_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_radacct_port'($*)) dnl
-
- gen_require(`
- type radacct_port_t;
- ')
-
- allow $1 radacct_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_radacct_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the radacct port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_radacct_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_radacct_port'($*)) dnl
-
- gen_require(`
- type radacct_port_t;
- ')
-
- allow $1 radacct_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_radacct_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the radacct port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_radacct_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_radacct_port'($*)) dnl
-
- gen_require(`
- type radacct_port_t;
- ')
-
- allow $1 radacct_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_radacct_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send radacct_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_radacct_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_radacct_client_packets'($*)) dnl
-
- gen_require(`
- type radacct_client_packet_t;
- ')
-
- allow $1 radacct_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_radacct_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send radacct_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_radacct_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_radacct_client_packets'($*)) dnl
-
- gen_require(`
- type radacct_client_packet_t;
- ')
-
- dontaudit $1 radacct_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_radacct_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive radacct_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_radacct_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_radacct_client_packets'($*)) dnl
-
- gen_require(`
- type radacct_client_packet_t;
- ')
-
- allow $1 radacct_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_radacct_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive radacct_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_radacct_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_radacct_client_packets'($*)) dnl
-
- gen_require(`
- type radacct_client_packet_t;
- ')
-
- dontaudit $1 radacct_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_radacct_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive radacct_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_radacct_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_radacct_client_packets'($*)) dnl
-
- corenet_send_radacct_client_packets($1)
- corenet_receive_radacct_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_radacct_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive radacct_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_radacct_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_radacct_client_packets'($*)) dnl
-
- corenet_dontaudit_send_radacct_client_packets($1)
- corenet_dontaudit_receive_radacct_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_radacct_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to radacct_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_radacct_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_radacct_client_packets'($*)) dnl
-
- gen_require(`
- type radacct_client_packet_t;
- ')
-
- allow $1 radacct_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_radacct_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send radacct_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_radacct_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_radacct_server_packets'($*)) dnl
-
- gen_require(`
- type radacct_server_packet_t;
- ')
-
- allow $1 radacct_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_radacct_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send radacct_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_radacct_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_radacct_server_packets'($*)) dnl
-
- gen_require(`
- type radacct_server_packet_t;
- ')
-
- dontaudit $1 radacct_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_radacct_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive radacct_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_radacct_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_radacct_server_packets'($*)) dnl
-
- gen_require(`
- type radacct_server_packet_t;
- ')
-
- allow $1 radacct_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_radacct_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive radacct_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_radacct_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_radacct_server_packets'($*)) dnl
-
- gen_require(`
- type radacct_server_packet_t;
- ')
-
- dontaudit $1 radacct_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_radacct_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive radacct_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_radacct_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_radacct_server_packets'($*)) dnl
-
- corenet_send_radacct_server_packets($1)
- corenet_receive_radacct_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_radacct_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive radacct_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_radacct_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_radacct_server_packets'($*)) dnl
-
- corenet_dontaudit_send_radacct_server_packets($1)
- corenet_dontaudit_receive_radacct_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_radacct_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to radacct_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_radacct_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_radacct_server_packets'($*)) dnl
-
- gen_require(`
- type radacct_server_packet_t;
- ')
-
- allow $1 radacct_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_radacct_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the radius port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_radius_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_radius_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_radius_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the radius port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_radius_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_radius_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_radius_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the radius port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_radius_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_radius_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_radius_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the radius port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_radius_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_radius_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_radius_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the radius port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_radius_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_radius_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_radius_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the radius port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_radius_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_radius_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_radius_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the radius port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_radius_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_radius_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_radius_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the radius port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_radius_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_radius_port'($*)) dnl
-
- gen_require(`
- type radius_port_t;
- ')
-
- allow $1 radius_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_radius_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the radius port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_radius_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_radius_port'($*)) dnl
-
- gen_require(`
- type radius_port_t;
- ')
-
- allow $1 radius_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_radius_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the radius port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_radius_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_radius_port'($*)) dnl
-
- gen_require(`
- type radius_port_t;
- ')
-
- allow $1 radius_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_radius_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send radius_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_radius_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_radius_client_packets'($*)) dnl
-
- gen_require(`
- type radius_client_packet_t;
- ')
-
- allow $1 radius_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_radius_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send radius_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_radius_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_radius_client_packets'($*)) dnl
-
- gen_require(`
- type radius_client_packet_t;
- ')
-
- dontaudit $1 radius_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_radius_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive radius_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_radius_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_radius_client_packets'($*)) dnl
-
- gen_require(`
- type radius_client_packet_t;
- ')
-
- allow $1 radius_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_radius_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive radius_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_radius_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_radius_client_packets'($*)) dnl
-
- gen_require(`
- type radius_client_packet_t;
- ')
-
- dontaudit $1 radius_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_radius_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive radius_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_radius_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_radius_client_packets'($*)) dnl
-
- corenet_send_radius_client_packets($1)
- corenet_receive_radius_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_radius_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive radius_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_radius_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_radius_client_packets'($*)) dnl
-
- corenet_dontaudit_send_radius_client_packets($1)
- corenet_dontaudit_receive_radius_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_radius_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to radius_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_radius_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_radius_client_packets'($*)) dnl
-
- gen_require(`
- type radius_client_packet_t;
- ')
-
- allow $1 radius_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_radius_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send radius_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_radius_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_radius_server_packets'($*)) dnl
-
- gen_require(`
- type radius_server_packet_t;
- ')
-
- allow $1 radius_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_radius_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send radius_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_radius_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_radius_server_packets'($*)) dnl
-
- gen_require(`
- type radius_server_packet_t;
- ')
-
- dontaudit $1 radius_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_radius_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive radius_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_radius_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_radius_server_packets'($*)) dnl
-
- gen_require(`
- type radius_server_packet_t;
- ')
-
- allow $1 radius_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_radius_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive radius_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_radius_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_radius_server_packets'($*)) dnl
-
- gen_require(`
- type radius_server_packet_t;
- ')
-
- dontaudit $1 radius_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_radius_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive radius_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_radius_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_radius_server_packets'($*)) dnl
-
- corenet_send_radius_server_packets($1)
- corenet_receive_radius_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_radius_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive radius_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_radius_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_radius_server_packets'($*)) dnl
-
- corenet_dontaudit_send_radius_server_packets($1)
- corenet_dontaudit_receive_radius_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_radius_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to radius_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_radius_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_radius_server_packets'($*)) dnl
-
- gen_require(`
- type radius_server_packet_t;
- ')
-
- allow $1 radius_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_radius_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the radsec port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_radsec_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_radsec_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_radsec_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the radsec port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_radsec_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_radsec_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_radsec_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the radsec port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_radsec_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_radsec_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_radsec_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the radsec port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_radsec_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_radsec_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_radsec_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the radsec port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_radsec_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_radsec_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_radsec_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the radsec port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_radsec_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_radsec_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_radsec_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the radsec port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_radsec_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_radsec_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_radsec_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the radsec port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_radsec_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_radsec_port'($*)) dnl
-
- gen_require(`
- type radsec_port_t;
- ')
-
- allow $1 radsec_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_radsec_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the radsec port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_radsec_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_radsec_port'($*)) dnl
-
- gen_require(`
- type radsec_port_t;
- ')
-
- allow $1 radsec_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_radsec_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the radsec port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_radsec_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_radsec_port'($*)) dnl
-
- gen_require(`
- type radsec_port_t;
- ')
-
- allow $1 radsec_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_radsec_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send radsec_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_radsec_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_radsec_client_packets'($*)) dnl
-
- gen_require(`
- type radsec_client_packet_t;
- ')
-
- allow $1 radsec_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_radsec_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send radsec_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_radsec_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_radsec_client_packets'($*)) dnl
-
- gen_require(`
- type radsec_client_packet_t;
- ')
-
- dontaudit $1 radsec_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_radsec_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive radsec_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_radsec_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_radsec_client_packets'($*)) dnl
-
- gen_require(`
- type radsec_client_packet_t;
- ')
-
- allow $1 radsec_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_radsec_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive radsec_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_radsec_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_radsec_client_packets'($*)) dnl
-
- gen_require(`
- type radsec_client_packet_t;
- ')
-
- dontaudit $1 radsec_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_radsec_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive radsec_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_radsec_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_radsec_client_packets'($*)) dnl
-
- corenet_send_radsec_client_packets($1)
- corenet_receive_radsec_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_radsec_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive radsec_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_radsec_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_radsec_client_packets'($*)) dnl
-
- corenet_dontaudit_send_radsec_client_packets($1)
- corenet_dontaudit_receive_radsec_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_radsec_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to radsec_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_radsec_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_radsec_client_packets'($*)) dnl
-
- gen_require(`
- type radsec_client_packet_t;
- ')
-
- allow $1 radsec_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_radsec_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send radsec_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_radsec_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_radsec_server_packets'($*)) dnl
-
- gen_require(`
- type radsec_server_packet_t;
- ')
-
- allow $1 radsec_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_radsec_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send radsec_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_radsec_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_radsec_server_packets'($*)) dnl
-
- gen_require(`
- type radsec_server_packet_t;
- ')
-
- dontaudit $1 radsec_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_radsec_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive radsec_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_radsec_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_radsec_server_packets'($*)) dnl
-
- gen_require(`
- type radsec_server_packet_t;
- ')
-
- allow $1 radsec_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_radsec_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive radsec_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_radsec_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_radsec_server_packets'($*)) dnl
-
- gen_require(`
- type radsec_server_packet_t;
- ')
-
- dontaudit $1 radsec_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_radsec_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive radsec_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_radsec_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_radsec_server_packets'($*)) dnl
-
- corenet_send_radsec_server_packets($1)
- corenet_receive_radsec_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_radsec_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive radsec_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_radsec_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_radsec_server_packets'($*)) dnl
-
- corenet_dontaudit_send_radsec_server_packets($1)
- corenet_dontaudit_receive_radsec_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_radsec_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to radsec_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_radsec_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_radsec_server_packets'($*)) dnl
-
- gen_require(`
- type radsec_server_packet_t;
- ')
-
- allow $1 radsec_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_radsec_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the razor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_razor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_razor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_razor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the razor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_razor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_razor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_razor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the razor port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_razor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_razor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_razor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the razor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_razor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_razor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_razor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the razor port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_razor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_razor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_razor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the razor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_razor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_razor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_razor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the razor port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_razor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_razor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_razor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the razor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_razor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_razor_port'($*)) dnl
-
- gen_require(`
- type razor_port_t;
- ')
-
- allow $1 razor_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_razor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the razor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_razor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_razor_port'($*)) dnl
-
- gen_require(`
- type razor_port_t;
- ')
-
- allow $1 razor_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_razor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the razor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_razor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_razor_port'($*)) dnl
-
- gen_require(`
- type razor_port_t;
- ')
-
- allow $1 razor_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_razor_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send razor_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_razor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_razor_client_packets'($*)) dnl
-
- gen_require(`
- type razor_client_packet_t;
- ')
-
- allow $1 razor_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_razor_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send razor_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_razor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_razor_client_packets'($*)) dnl
-
- gen_require(`
- type razor_client_packet_t;
- ')
-
- dontaudit $1 razor_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_razor_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive razor_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_razor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_razor_client_packets'($*)) dnl
-
- gen_require(`
- type razor_client_packet_t;
- ')
-
- allow $1 razor_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_razor_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive razor_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_razor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_razor_client_packets'($*)) dnl
-
- gen_require(`
- type razor_client_packet_t;
- ')
-
- dontaudit $1 razor_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_razor_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive razor_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_razor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_razor_client_packets'($*)) dnl
-
- corenet_send_razor_client_packets($1)
- corenet_receive_razor_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_razor_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive razor_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_razor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_razor_client_packets'($*)) dnl
-
- corenet_dontaudit_send_razor_client_packets($1)
- corenet_dontaudit_receive_razor_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_razor_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to razor_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_razor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_razor_client_packets'($*)) dnl
-
- gen_require(`
- type razor_client_packet_t;
- ')
-
- allow $1 razor_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_razor_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send razor_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_razor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_razor_server_packets'($*)) dnl
-
- gen_require(`
- type razor_server_packet_t;
- ')
-
- allow $1 razor_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_razor_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send razor_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_razor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_razor_server_packets'($*)) dnl
-
- gen_require(`
- type razor_server_packet_t;
- ')
-
- dontaudit $1 razor_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_razor_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive razor_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_razor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_razor_server_packets'($*)) dnl
-
- gen_require(`
- type razor_server_packet_t;
- ')
-
- allow $1 razor_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_razor_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive razor_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_razor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_razor_server_packets'($*)) dnl
-
- gen_require(`
- type razor_server_packet_t;
- ')
-
- dontaudit $1 razor_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_razor_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive razor_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_razor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_razor_server_packets'($*)) dnl
-
- corenet_send_razor_server_packets($1)
- corenet_receive_razor_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_razor_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive razor_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_razor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_razor_server_packets'($*)) dnl
-
- corenet_dontaudit_send_razor_server_packets($1)
- corenet_dontaudit_receive_razor_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_razor_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to razor_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_razor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_razor_server_packets'($*)) dnl
-
- gen_require(`
- type razor_server_packet_t;
- ')
-
- allow $1 razor_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_razor_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the redis port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_redis_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_redis_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_redis_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the redis port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_redis_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_redis_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_redis_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the redis port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_redis_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_redis_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_redis_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the redis port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_redis_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_redis_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_redis_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the redis port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_redis_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_redis_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_redis_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the redis port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_redis_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_redis_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_redis_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the redis port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_redis_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_redis_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_redis_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the redis port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_redis_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_redis_port'($*)) dnl
-
- gen_require(`
- type redis_port_t;
- ')
-
- allow $1 redis_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_redis_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the redis port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_redis_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_redis_port'($*)) dnl
-
- gen_require(`
- type redis_port_t;
- ')
-
- allow $1 redis_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_redis_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the redis port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_redis_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_redis_port'($*)) dnl
-
- gen_require(`
- type redis_port_t;
- ')
-
- allow $1 redis_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_redis_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send redis_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_redis_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_redis_client_packets'($*)) dnl
-
- gen_require(`
- type redis_client_packet_t;
- ')
-
- allow $1 redis_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_redis_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send redis_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_redis_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_redis_client_packets'($*)) dnl
-
- gen_require(`
- type redis_client_packet_t;
- ')
-
- dontaudit $1 redis_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_redis_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive redis_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_redis_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_redis_client_packets'($*)) dnl
-
- gen_require(`
- type redis_client_packet_t;
- ')
-
- allow $1 redis_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_redis_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive redis_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_redis_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_redis_client_packets'($*)) dnl
-
- gen_require(`
- type redis_client_packet_t;
- ')
-
- dontaudit $1 redis_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_redis_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive redis_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_redis_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_redis_client_packets'($*)) dnl
-
- corenet_send_redis_client_packets($1)
- corenet_receive_redis_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_redis_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive redis_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_redis_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_redis_client_packets'($*)) dnl
-
- corenet_dontaudit_send_redis_client_packets($1)
- corenet_dontaudit_receive_redis_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_redis_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to redis_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_redis_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_redis_client_packets'($*)) dnl
-
- gen_require(`
- type redis_client_packet_t;
- ')
-
- allow $1 redis_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_redis_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send redis_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_redis_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_redis_server_packets'($*)) dnl
-
- gen_require(`
- type redis_server_packet_t;
- ')
-
- allow $1 redis_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_redis_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send redis_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_redis_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_redis_server_packets'($*)) dnl
-
- gen_require(`
- type redis_server_packet_t;
- ')
-
- dontaudit $1 redis_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_redis_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive redis_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_redis_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_redis_server_packets'($*)) dnl
-
- gen_require(`
- type redis_server_packet_t;
- ')
-
- allow $1 redis_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_redis_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive redis_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_redis_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_redis_server_packets'($*)) dnl
-
- gen_require(`
- type redis_server_packet_t;
- ')
-
- dontaudit $1 redis_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_redis_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive redis_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_redis_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_redis_server_packets'($*)) dnl
-
- corenet_send_redis_server_packets($1)
- corenet_receive_redis_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_redis_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive redis_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_redis_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_redis_server_packets'($*)) dnl
-
- corenet_dontaudit_send_redis_server_packets($1)
- corenet_dontaudit_receive_redis_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_redis_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to redis_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_redis_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_redis_server_packets'($*)) dnl
-
- gen_require(`
- type redis_server_packet_t;
- ')
-
- allow $1 redis_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_redis_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the repository port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_repository_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_repository_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_repository_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the repository port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_repository_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_repository_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_repository_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the repository port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_repository_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_repository_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_repository_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the repository port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_repository_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_repository_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_repository_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the repository port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_repository_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_repository_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_repository_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the repository port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_repository_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_repository_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_repository_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the repository port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_repository_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_repository_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_repository_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the repository port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_repository_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_repository_port'($*)) dnl
-
- gen_require(`
- type repository_port_t;
- ')
-
- allow $1 repository_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_repository_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the repository port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_repository_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_repository_port'($*)) dnl
-
- gen_require(`
- type repository_port_t;
- ')
-
- allow $1 repository_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_repository_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the repository port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_repository_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_repository_port'($*)) dnl
-
- gen_require(`
- type repository_port_t;
- ')
-
- allow $1 repository_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_repository_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send repository_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_repository_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_repository_client_packets'($*)) dnl
-
- gen_require(`
- type repository_client_packet_t;
- ')
-
- allow $1 repository_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_repository_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send repository_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_repository_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_repository_client_packets'($*)) dnl
-
- gen_require(`
- type repository_client_packet_t;
- ')
-
- dontaudit $1 repository_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_repository_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive repository_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_repository_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_repository_client_packets'($*)) dnl
-
- gen_require(`
- type repository_client_packet_t;
- ')
-
- allow $1 repository_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_repository_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive repository_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_repository_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_repository_client_packets'($*)) dnl
-
- gen_require(`
- type repository_client_packet_t;
- ')
-
- dontaudit $1 repository_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_repository_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive repository_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_repository_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_repository_client_packets'($*)) dnl
-
- corenet_send_repository_client_packets($1)
- corenet_receive_repository_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_repository_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive repository_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_repository_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_repository_client_packets'($*)) dnl
-
- corenet_dontaudit_send_repository_client_packets($1)
- corenet_dontaudit_receive_repository_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_repository_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to repository_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_repository_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_repository_client_packets'($*)) dnl
-
- gen_require(`
- type repository_client_packet_t;
- ')
-
- allow $1 repository_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_repository_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send repository_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_repository_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_repository_server_packets'($*)) dnl
-
- gen_require(`
- type repository_server_packet_t;
- ')
-
- allow $1 repository_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_repository_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send repository_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_repository_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_repository_server_packets'($*)) dnl
-
- gen_require(`
- type repository_server_packet_t;
- ')
-
- dontaudit $1 repository_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_repository_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive repository_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_repository_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_repository_server_packets'($*)) dnl
-
- gen_require(`
- type repository_server_packet_t;
- ')
-
- allow $1 repository_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_repository_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive repository_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_repository_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_repository_server_packets'($*)) dnl
-
- gen_require(`
- type repository_server_packet_t;
- ')
-
- dontaudit $1 repository_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_repository_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive repository_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_repository_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_repository_server_packets'($*)) dnl
-
- corenet_send_repository_server_packets($1)
- corenet_receive_repository_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_repository_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive repository_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_repository_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_repository_server_packets'($*)) dnl
-
- corenet_dontaudit_send_repository_server_packets($1)
- corenet_dontaudit_receive_repository_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_repository_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to repository_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_repository_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_repository_server_packets'($*)) dnl
-
- gen_require(`
- type repository_server_packet_t;
- ')
-
- allow $1 repository_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_repository_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the ricci port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_ricci_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ricci_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ricci_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the ricci port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_ricci_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ricci_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_ricci_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the ricci port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_ricci_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ricci_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ricci_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the ricci port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_ricci_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ricci_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ricci_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the ricci port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_ricci_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ricci_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ricci_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the ricci port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_ricci_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ricci_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ricci_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the ricci port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_ricci_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ricci_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ricci_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the ricci port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_ricci_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ricci_port'($*)) dnl
-
- gen_require(`
- type ricci_port_t;
- ')
-
- allow $1 ricci_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ricci_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the ricci port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_ricci_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ricci_port'($*)) dnl
-
- gen_require(`
- type ricci_port_t;
- ')
-
- allow $1 ricci_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ricci_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the ricci port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_ricci_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ricci_port'($*)) dnl
-
- gen_require(`
- type ricci_port_t;
- ')
-
- allow $1 ricci_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ricci_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ricci_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ricci_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ricci_client_packets'($*)) dnl
-
- gen_require(`
- type ricci_client_packet_t;
- ')
-
- allow $1 ricci_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ricci_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ricci_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ricci_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ricci_client_packets'($*)) dnl
-
- gen_require(`
- type ricci_client_packet_t;
- ')
-
- dontaudit $1 ricci_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ricci_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ricci_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ricci_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ricci_client_packets'($*)) dnl
-
- gen_require(`
- type ricci_client_packet_t;
- ')
-
- allow $1 ricci_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ricci_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ricci_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ricci_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ricci_client_packets'($*)) dnl
-
- gen_require(`
- type ricci_client_packet_t;
- ')
-
- dontaudit $1 ricci_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ricci_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ricci_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ricci_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ricci_client_packets'($*)) dnl
-
- corenet_send_ricci_client_packets($1)
- corenet_receive_ricci_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ricci_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ricci_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ricci_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ricci_client_packets'($*)) dnl
-
- corenet_dontaudit_send_ricci_client_packets($1)
- corenet_dontaudit_receive_ricci_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ricci_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ricci_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ricci_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ricci_client_packets'($*)) dnl
-
- gen_require(`
- type ricci_client_packet_t;
- ')
-
- allow $1 ricci_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ricci_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ricci_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ricci_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ricci_server_packets'($*)) dnl
-
- gen_require(`
- type ricci_server_packet_t;
- ')
-
- allow $1 ricci_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ricci_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ricci_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ricci_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ricci_server_packets'($*)) dnl
-
- gen_require(`
- type ricci_server_packet_t;
- ')
-
- dontaudit $1 ricci_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ricci_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ricci_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ricci_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ricci_server_packets'($*)) dnl
-
- gen_require(`
- type ricci_server_packet_t;
- ')
-
- allow $1 ricci_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ricci_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ricci_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ricci_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ricci_server_packets'($*)) dnl
-
- gen_require(`
- type ricci_server_packet_t;
- ')
-
- dontaudit $1 ricci_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ricci_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ricci_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ricci_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ricci_server_packets'($*)) dnl
-
- corenet_send_ricci_server_packets($1)
- corenet_receive_ricci_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ricci_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ricci_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ricci_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ricci_server_packets'($*)) dnl
-
- corenet_dontaudit_send_ricci_server_packets($1)
- corenet_dontaudit_receive_ricci_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ricci_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ricci_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ricci_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ricci_server_packets'($*)) dnl
-
- gen_require(`
- type ricci_server_packet_t;
- ')
-
- allow $1 ricci_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ricci_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the ricci_modcluster port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_ricci_modcluster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ricci_modcluster_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ricci_modcluster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the ricci_modcluster port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_ricci_modcluster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ricci_modcluster_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_ricci_modcluster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the ricci_modcluster port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_ricci_modcluster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ricci_modcluster_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ricci_modcluster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the ricci_modcluster port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_ricci_modcluster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ricci_modcluster_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ricci_modcluster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the ricci_modcluster port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_ricci_modcluster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ricci_modcluster_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ricci_modcluster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the ricci_modcluster port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_ricci_modcluster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ricci_modcluster_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ricci_modcluster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the ricci_modcluster port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_ricci_modcluster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ricci_modcluster_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ricci_modcluster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the ricci_modcluster port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_ricci_modcluster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ricci_modcluster_port'($*)) dnl
-
- gen_require(`
- type ricci_modcluster_port_t;
- ')
-
- allow $1 ricci_modcluster_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ricci_modcluster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the ricci_modcluster port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_ricci_modcluster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ricci_modcluster_port'($*)) dnl
-
- gen_require(`
- type ricci_modcluster_port_t;
- ')
-
- allow $1 ricci_modcluster_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ricci_modcluster_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the ricci_modcluster port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_ricci_modcluster_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ricci_modcluster_port'($*)) dnl
-
- gen_require(`
- type ricci_modcluster_port_t;
- ')
-
- allow $1 ricci_modcluster_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ricci_modcluster_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ricci_modcluster_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ricci_modcluster_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ricci_modcluster_client_packets'($*)) dnl
-
- gen_require(`
- type ricci_modcluster_client_packet_t;
- ')
-
- allow $1 ricci_modcluster_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ricci_modcluster_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ricci_modcluster_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ricci_modcluster_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ricci_modcluster_client_packets'($*)) dnl
-
- gen_require(`
- type ricci_modcluster_client_packet_t;
- ')
-
- dontaudit $1 ricci_modcluster_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ricci_modcluster_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ricci_modcluster_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ricci_modcluster_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ricci_modcluster_client_packets'($*)) dnl
-
- gen_require(`
- type ricci_modcluster_client_packet_t;
- ')
-
- allow $1 ricci_modcluster_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ricci_modcluster_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ricci_modcluster_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ricci_modcluster_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ricci_modcluster_client_packets'($*)) dnl
-
- gen_require(`
- type ricci_modcluster_client_packet_t;
- ')
-
- dontaudit $1 ricci_modcluster_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ricci_modcluster_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ricci_modcluster_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ricci_modcluster_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ricci_modcluster_client_packets'($*)) dnl
-
- corenet_send_ricci_modcluster_client_packets($1)
- corenet_receive_ricci_modcluster_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ricci_modcluster_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ricci_modcluster_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ricci_modcluster_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ricci_modcluster_client_packets'($*)) dnl
-
- corenet_dontaudit_send_ricci_modcluster_client_packets($1)
- corenet_dontaudit_receive_ricci_modcluster_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ricci_modcluster_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ricci_modcluster_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ricci_modcluster_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ricci_modcluster_client_packets'($*)) dnl
-
- gen_require(`
- type ricci_modcluster_client_packet_t;
- ')
-
- allow $1 ricci_modcluster_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ricci_modcluster_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ricci_modcluster_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ricci_modcluster_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ricci_modcluster_server_packets'($*)) dnl
-
- gen_require(`
- type ricci_modcluster_server_packet_t;
- ')
-
- allow $1 ricci_modcluster_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ricci_modcluster_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ricci_modcluster_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ricci_modcluster_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ricci_modcluster_server_packets'($*)) dnl
-
- gen_require(`
- type ricci_modcluster_server_packet_t;
- ')
-
- dontaudit $1 ricci_modcluster_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ricci_modcluster_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ricci_modcluster_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ricci_modcluster_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ricci_modcluster_server_packets'($*)) dnl
-
- gen_require(`
- type ricci_modcluster_server_packet_t;
- ')
-
- allow $1 ricci_modcluster_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ricci_modcluster_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ricci_modcluster_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ricci_modcluster_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ricci_modcluster_server_packets'($*)) dnl
-
- gen_require(`
- type ricci_modcluster_server_packet_t;
- ')
-
- dontaudit $1 ricci_modcluster_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ricci_modcluster_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ricci_modcluster_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ricci_modcluster_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ricci_modcluster_server_packets'($*)) dnl
-
- corenet_send_ricci_modcluster_server_packets($1)
- corenet_receive_ricci_modcluster_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ricci_modcluster_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ricci_modcluster_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ricci_modcluster_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ricci_modcluster_server_packets'($*)) dnl
-
- corenet_dontaudit_send_ricci_modcluster_server_packets($1)
- corenet_dontaudit_receive_ricci_modcluster_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ricci_modcluster_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ricci_modcluster_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ricci_modcluster_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ricci_modcluster_server_packets'($*)) dnl
-
- gen_require(`
- type ricci_modcluster_server_packet_t;
- ')
-
- allow $1 ricci_modcluster_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ricci_modcluster_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the rlogind port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_rlogind_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_rlogind_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_rlogind_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the rlogind port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_rlogind_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_rlogind_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_rlogind_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the rlogind port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_rlogind_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_rlogind_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_rlogind_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the rlogind port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_rlogind_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_rlogind_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_rlogind_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the rlogind port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_rlogind_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_rlogind_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_rlogind_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the rlogind port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_rlogind_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_rlogind_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_rlogind_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the rlogind port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_rlogind_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_rlogind_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_rlogind_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the rlogind port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_rlogind_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_rlogind_port'($*)) dnl
-
- gen_require(`
- type rlogind_port_t;
- ')
-
- allow $1 rlogind_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_rlogind_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the rlogind port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_rlogind_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_rlogind_port'($*)) dnl
-
- gen_require(`
- type rlogind_port_t;
- ')
-
- allow $1 rlogind_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_rlogind_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the rlogind port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_rlogind_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_rlogind_port'($*)) dnl
-
- gen_require(`
- type rlogind_port_t;
- ')
-
- allow $1 rlogind_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_rlogind_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send rlogind_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_rlogind_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_rlogind_client_packets'($*)) dnl
-
- gen_require(`
- type rlogind_client_packet_t;
- ')
-
- allow $1 rlogind_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_rlogind_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send rlogind_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_rlogind_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rlogind_client_packets'($*)) dnl
-
- gen_require(`
- type rlogind_client_packet_t;
- ')
-
- dontaudit $1 rlogind_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rlogind_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive rlogind_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_rlogind_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_rlogind_client_packets'($*)) dnl
-
- gen_require(`
- type rlogind_client_packet_t;
- ')
-
- allow $1 rlogind_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_rlogind_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive rlogind_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_rlogind_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rlogind_client_packets'($*)) dnl
-
- gen_require(`
- type rlogind_client_packet_t;
- ')
-
- dontaudit $1 rlogind_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rlogind_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive rlogind_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_rlogind_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rlogind_client_packets'($*)) dnl
-
- corenet_send_rlogind_client_packets($1)
- corenet_receive_rlogind_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rlogind_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive rlogind_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_rlogind_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rlogind_client_packets'($*)) dnl
-
- corenet_dontaudit_send_rlogind_client_packets($1)
- corenet_dontaudit_receive_rlogind_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rlogind_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to rlogind_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_rlogind_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rlogind_client_packets'($*)) dnl
-
- gen_require(`
- type rlogind_client_packet_t;
- ')
-
- allow $1 rlogind_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_rlogind_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send rlogind_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_rlogind_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_rlogind_server_packets'($*)) dnl
-
- gen_require(`
- type rlogind_server_packet_t;
- ')
-
- allow $1 rlogind_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_rlogind_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send rlogind_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_rlogind_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rlogind_server_packets'($*)) dnl
-
- gen_require(`
- type rlogind_server_packet_t;
- ')
-
- dontaudit $1 rlogind_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rlogind_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive rlogind_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_rlogind_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_rlogind_server_packets'($*)) dnl
-
- gen_require(`
- type rlogind_server_packet_t;
- ')
-
- allow $1 rlogind_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_rlogind_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive rlogind_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_rlogind_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rlogind_server_packets'($*)) dnl
-
- gen_require(`
- type rlogind_server_packet_t;
- ')
-
- dontaudit $1 rlogind_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rlogind_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive rlogind_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_rlogind_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rlogind_server_packets'($*)) dnl
-
- corenet_send_rlogind_server_packets($1)
- corenet_receive_rlogind_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rlogind_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive rlogind_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_rlogind_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rlogind_server_packets'($*)) dnl
-
- corenet_dontaudit_send_rlogind_server_packets($1)
- corenet_dontaudit_receive_rlogind_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rlogind_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to rlogind_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_rlogind_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rlogind_server_packets'($*)) dnl
-
- gen_require(`
- type rlogind_server_packet_t;
- ')
-
- allow $1 rlogind_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_rlogind_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the rndc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_rndc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_rndc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_rndc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the rndc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_rndc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_rndc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_rndc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the rndc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_rndc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_rndc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_rndc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the rndc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_rndc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_rndc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_rndc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the rndc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_rndc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_rndc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_rndc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the rndc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_rndc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_rndc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_rndc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the rndc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_rndc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_rndc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_rndc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the rndc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_rndc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_rndc_port'($*)) dnl
-
- gen_require(`
- type rndc_port_t;
- ')
-
- allow $1 rndc_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_rndc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the rndc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_rndc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_rndc_port'($*)) dnl
-
- gen_require(`
- type rndc_port_t;
- ')
-
- allow $1 rndc_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_rndc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the rndc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_rndc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_rndc_port'($*)) dnl
-
- gen_require(`
- type rndc_port_t;
- ')
-
- allow $1 rndc_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_rndc_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send rndc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_rndc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_rndc_client_packets'($*)) dnl
-
- gen_require(`
- type rndc_client_packet_t;
- ')
-
- allow $1 rndc_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_rndc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send rndc_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_rndc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rndc_client_packets'($*)) dnl
-
- gen_require(`
- type rndc_client_packet_t;
- ')
-
- dontaudit $1 rndc_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rndc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive rndc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_rndc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_rndc_client_packets'($*)) dnl
-
- gen_require(`
- type rndc_client_packet_t;
- ')
-
- allow $1 rndc_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_rndc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive rndc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_rndc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rndc_client_packets'($*)) dnl
-
- gen_require(`
- type rndc_client_packet_t;
- ')
-
- dontaudit $1 rndc_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rndc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive rndc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_rndc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rndc_client_packets'($*)) dnl
-
- corenet_send_rndc_client_packets($1)
- corenet_receive_rndc_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rndc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive rndc_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_rndc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rndc_client_packets'($*)) dnl
-
- corenet_dontaudit_send_rndc_client_packets($1)
- corenet_dontaudit_receive_rndc_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rndc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to rndc_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_rndc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rndc_client_packets'($*)) dnl
-
- gen_require(`
- type rndc_client_packet_t;
- ')
-
- allow $1 rndc_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_rndc_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send rndc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_rndc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_rndc_server_packets'($*)) dnl
-
- gen_require(`
- type rndc_server_packet_t;
- ')
-
- allow $1 rndc_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_rndc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send rndc_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_rndc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rndc_server_packets'($*)) dnl
-
- gen_require(`
- type rndc_server_packet_t;
- ')
-
- dontaudit $1 rndc_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rndc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive rndc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_rndc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_rndc_server_packets'($*)) dnl
-
- gen_require(`
- type rndc_server_packet_t;
- ')
-
- allow $1 rndc_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_rndc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive rndc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_rndc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rndc_server_packets'($*)) dnl
-
- gen_require(`
- type rndc_server_packet_t;
- ')
-
- dontaudit $1 rndc_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rndc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive rndc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_rndc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rndc_server_packets'($*)) dnl
-
- corenet_send_rndc_server_packets($1)
- corenet_receive_rndc_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rndc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive rndc_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_rndc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rndc_server_packets'($*)) dnl
-
- corenet_dontaudit_send_rndc_server_packets($1)
- corenet_dontaudit_receive_rndc_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rndc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to rndc_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_rndc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rndc_server_packets'($*)) dnl
-
- gen_require(`
- type rndc_server_packet_t;
- ')
-
- allow $1 rndc_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_rndc_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the router port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_router_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_router_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_router_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the router port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_router_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_router_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_router_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the router port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_router_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_router_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_router_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the router port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_router_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_router_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_router_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the router port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_router_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_router_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_router_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the router port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_router_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_router_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_router_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the router port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_router_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_router_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_router_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the router port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_router_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_router_port'($*)) dnl
-
- gen_require(`
- type router_port_t;
- ')
-
- allow $1 router_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_router_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the router port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_router_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_router_port'($*)) dnl
-
- gen_require(`
- type router_port_t;
- ')
-
- allow $1 router_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_router_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the router port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_router_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_router_port'($*)) dnl
-
- gen_require(`
- type router_port_t;
- ')
-
- allow $1 router_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_router_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send router_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_router_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_router_client_packets'($*)) dnl
-
- gen_require(`
- type router_client_packet_t;
- ')
-
- allow $1 router_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_router_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send router_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_router_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_router_client_packets'($*)) dnl
-
- gen_require(`
- type router_client_packet_t;
- ')
-
- dontaudit $1 router_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_router_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive router_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_router_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_router_client_packets'($*)) dnl
-
- gen_require(`
- type router_client_packet_t;
- ')
-
- allow $1 router_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_router_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive router_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_router_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_router_client_packets'($*)) dnl
-
- gen_require(`
- type router_client_packet_t;
- ')
-
- dontaudit $1 router_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_router_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive router_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_router_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_router_client_packets'($*)) dnl
-
- corenet_send_router_client_packets($1)
- corenet_receive_router_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_router_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive router_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_router_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_router_client_packets'($*)) dnl
-
- corenet_dontaudit_send_router_client_packets($1)
- corenet_dontaudit_receive_router_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_router_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to router_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_router_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_router_client_packets'($*)) dnl
-
- gen_require(`
- type router_client_packet_t;
- ')
-
- allow $1 router_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_router_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send router_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_router_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_router_server_packets'($*)) dnl
-
- gen_require(`
- type router_server_packet_t;
- ')
-
- allow $1 router_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_router_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send router_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_router_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_router_server_packets'($*)) dnl
-
- gen_require(`
- type router_server_packet_t;
- ')
-
- dontaudit $1 router_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_router_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive router_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_router_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_router_server_packets'($*)) dnl
-
- gen_require(`
- type router_server_packet_t;
- ')
-
- allow $1 router_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_router_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive router_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_router_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_router_server_packets'($*)) dnl
-
- gen_require(`
- type router_server_packet_t;
- ')
-
- dontaudit $1 router_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_router_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive router_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_router_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_router_server_packets'($*)) dnl
-
- corenet_send_router_server_packets($1)
- corenet_receive_router_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_router_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive router_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_router_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_router_server_packets'($*)) dnl
-
- corenet_dontaudit_send_router_server_packets($1)
- corenet_dontaudit_receive_router_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_router_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to router_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_router_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_router_server_packets'($*)) dnl
-
- gen_require(`
- type router_server_packet_t;
- ')
-
- allow $1 router_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_router_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the rsh port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_rsh_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_rsh_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_rsh_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the rsh port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_rsh_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_rsh_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_rsh_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the rsh port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_rsh_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_rsh_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_rsh_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the rsh port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_rsh_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_rsh_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_rsh_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the rsh port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_rsh_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_rsh_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_rsh_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the rsh port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_rsh_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_rsh_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_rsh_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the rsh port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_rsh_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_rsh_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_rsh_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the rsh port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_rsh_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_rsh_port'($*)) dnl
-
- gen_require(`
- type rsh_port_t;
- ')
-
- allow $1 rsh_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_rsh_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the rsh port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_rsh_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_rsh_port'($*)) dnl
-
- gen_require(`
- type rsh_port_t;
- ')
-
- allow $1 rsh_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_rsh_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the rsh port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_rsh_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_rsh_port'($*)) dnl
-
- gen_require(`
- type rsh_port_t;
- ')
-
- allow $1 rsh_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_rsh_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send rsh_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_rsh_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_rsh_client_packets'($*)) dnl
-
- gen_require(`
- type rsh_client_packet_t;
- ')
-
- allow $1 rsh_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_rsh_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send rsh_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_rsh_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rsh_client_packets'($*)) dnl
-
- gen_require(`
- type rsh_client_packet_t;
- ')
-
- dontaudit $1 rsh_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rsh_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive rsh_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_rsh_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_rsh_client_packets'($*)) dnl
-
- gen_require(`
- type rsh_client_packet_t;
- ')
-
- allow $1 rsh_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_rsh_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive rsh_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_rsh_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rsh_client_packets'($*)) dnl
-
- gen_require(`
- type rsh_client_packet_t;
- ')
-
- dontaudit $1 rsh_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rsh_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive rsh_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_rsh_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rsh_client_packets'($*)) dnl
-
- corenet_send_rsh_client_packets($1)
- corenet_receive_rsh_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rsh_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive rsh_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_rsh_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rsh_client_packets'($*)) dnl
-
- corenet_dontaudit_send_rsh_client_packets($1)
- corenet_dontaudit_receive_rsh_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rsh_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to rsh_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_rsh_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rsh_client_packets'($*)) dnl
-
- gen_require(`
- type rsh_client_packet_t;
- ')
-
- allow $1 rsh_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_rsh_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send rsh_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_rsh_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_rsh_server_packets'($*)) dnl
-
- gen_require(`
- type rsh_server_packet_t;
- ')
-
- allow $1 rsh_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_rsh_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send rsh_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_rsh_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rsh_server_packets'($*)) dnl
-
- gen_require(`
- type rsh_server_packet_t;
- ')
-
- dontaudit $1 rsh_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rsh_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive rsh_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_rsh_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_rsh_server_packets'($*)) dnl
-
- gen_require(`
- type rsh_server_packet_t;
- ')
-
- allow $1 rsh_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_rsh_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive rsh_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_rsh_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rsh_server_packets'($*)) dnl
-
- gen_require(`
- type rsh_server_packet_t;
- ')
-
- dontaudit $1 rsh_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rsh_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive rsh_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_rsh_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rsh_server_packets'($*)) dnl
-
- corenet_send_rsh_server_packets($1)
- corenet_receive_rsh_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rsh_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive rsh_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_rsh_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rsh_server_packets'($*)) dnl
-
- corenet_dontaudit_send_rsh_server_packets($1)
- corenet_dontaudit_receive_rsh_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rsh_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to rsh_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_rsh_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rsh_server_packets'($*)) dnl
-
- gen_require(`
- type rsh_server_packet_t;
- ')
-
- allow $1 rsh_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_rsh_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the rsync port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_rsync_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_rsync_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_rsync_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the rsync port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_rsync_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_rsync_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_rsync_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the rsync port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_rsync_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_rsync_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_rsync_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the rsync port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_rsync_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_rsync_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_rsync_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the rsync port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_rsync_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_rsync_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_rsync_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the rsync port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_rsync_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_rsync_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_rsync_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the rsync port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_rsync_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_rsync_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_rsync_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the rsync port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_rsync_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_rsync_port'($*)) dnl
-
- gen_require(`
- type rsync_port_t;
- ')
-
- allow $1 rsync_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_rsync_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the rsync port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_rsync_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_rsync_port'($*)) dnl
-
- gen_require(`
- type rsync_port_t;
- ')
-
- allow $1 rsync_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_rsync_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the rsync port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_rsync_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_rsync_port'($*)) dnl
-
- gen_require(`
- type rsync_port_t;
- ')
-
- allow $1 rsync_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_rsync_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send rsync_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_rsync_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_rsync_client_packets'($*)) dnl
-
- gen_require(`
- type rsync_client_packet_t;
- ')
-
- allow $1 rsync_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_rsync_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send rsync_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_rsync_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rsync_client_packets'($*)) dnl
-
- gen_require(`
- type rsync_client_packet_t;
- ')
-
- dontaudit $1 rsync_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rsync_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive rsync_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_rsync_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_rsync_client_packets'($*)) dnl
-
- gen_require(`
- type rsync_client_packet_t;
- ')
-
- allow $1 rsync_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_rsync_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive rsync_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_rsync_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rsync_client_packets'($*)) dnl
-
- gen_require(`
- type rsync_client_packet_t;
- ')
-
- dontaudit $1 rsync_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rsync_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive rsync_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_rsync_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rsync_client_packets'($*)) dnl
-
- corenet_send_rsync_client_packets($1)
- corenet_receive_rsync_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rsync_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive rsync_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_rsync_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rsync_client_packets'($*)) dnl
-
- corenet_dontaudit_send_rsync_client_packets($1)
- corenet_dontaudit_receive_rsync_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rsync_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to rsync_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_rsync_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rsync_client_packets'($*)) dnl
-
- gen_require(`
- type rsync_client_packet_t;
- ')
-
- allow $1 rsync_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_rsync_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send rsync_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_rsync_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_rsync_server_packets'($*)) dnl
-
- gen_require(`
- type rsync_server_packet_t;
- ')
-
- allow $1 rsync_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_rsync_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send rsync_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_rsync_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rsync_server_packets'($*)) dnl
-
- gen_require(`
- type rsync_server_packet_t;
- ')
-
- dontaudit $1 rsync_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rsync_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive rsync_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_rsync_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_rsync_server_packets'($*)) dnl
-
- gen_require(`
- type rsync_server_packet_t;
- ')
-
- allow $1 rsync_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_rsync_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive rsync_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_rsync_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rsync_server_packets'($*)) dnl
-
- gen_require(`
- type rsync_server_packet_t;
- ')
-
- dontaudit $1 rsync_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rsync_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive rsync_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_rsync_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rsync_server_packets'($*)) dnl
-
- corenet_send_rsync_server_packets($1)
- corenet_receive_rsync_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rsync_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive rsync_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_rsync_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rsync_server_packets'($*)) dnl
-
- corenet_dontaudit_send_rsync_server_packets($1)
- corenet_dontaudit_receive_rsync_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rsync_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to rsync_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_rsync_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rsync_server_packets'($*)) dnl
-
- gen_require(`
- type rsync_server_packet_t;
- ')
-
- allow $1 rsync_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_rsync_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the rtorrent port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_rtorrent_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_rtorrent_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_rtorrent_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the rtorrent port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_rtorrent_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_rtorrent_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_rtorrent_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the rtorrent port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_rtorrent_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_rtorrent_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_rtorrent_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the rtorrent port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_rtorrent_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_rtorrent_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_rtorrent_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the rtorrent port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_rtorrent_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_rtorrent_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_rtorrent_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the rtorrent port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_rtorrent_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_rtorrent_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_rtorrent_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the rtorrent port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_rtorrent_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_rtorrent_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_rtorrent_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the rtorrent port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_rtorrent_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_rtorrent_port'($*)) dnl
-
- gen_require(`
- type rtorrent_port_t;
- ')
-
- allow $1 rtorrent_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_rtorrent_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the rtorrent port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_rtorrent_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_rtorrent_port'($*)) dnl
-
- gen_require(`
- type rtorrent_port_t;
- ')
-
- allow $1 rtorrent_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_rtorrent_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the rtorrent port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_rtorrent_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_rtorrent_port'($*)) dnl
-
- gen_require(`
- type rtorrent_port_t;
- ')
-
- allow $1 rtorrent_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_rtorrent_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send rtorrent_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_rtorrent_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_rtorrent_client_packets'($*)) dnl
-
- gen_require(`
- type rtorrent_client_packet_t;
- ')
-
- allow $1 rtorrent_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_rtorrent_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send rtorrent_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_rtorrent_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rtorrent_client_packets'($*)) dnl
-
- gen_require(`
- type rtorrent_client_packet_t;
- ')
-
- dontaudit $1 rtorrent_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rtorrent_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive rtorrent_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_rtorrent_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_rtorrent_client_packets'($*)) dnl
-
- gen_require(`
- type rtorrent_client_packet_t;
- ')
-
- allow $1 rtorrent_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_rtorrent_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive rtorrent_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_rtorrent_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rtorrent_client_packets'($*)) dnl
-
- gen_require(`
- type rtorrent_client_packet_t;
- ')
-
- dontaudit $1 rtorrent_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rtorrent_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive rtorrent_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_rtorrent_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rtorrent_client_packets'($*)) dnl
-
- corenet_send_rtorrent_client_packets($1)
- corenet_receive_rtorrent_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rtorrent_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive rtorrent_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_rtorrent_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rtorrent_client_packets'($*)) dnl
-
- corenet_dontaudit_send_rtorrent_client_packets($1)
- corenet_dontaudit_receive_rtorrent_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rtorrent_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to rtorrent_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_rtorrent_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rtorrent_client_packets'($*)) dnl
-
- gen_require(`
- type rtorrent_client_packet_t;
- ')
-
- allow $1 rtorrent_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_rtorrent_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send rtorrent_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_rtorrent_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_rtorrent_server_packets'($*)) dnl
-
- gen_require(`
- type rtorrent_server_packet_t;
- ')
-
- allow $1 rtorrent_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_rtorrent_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send rtorrent_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_rtorrent_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rtorrent_server_packets'($*)) dnl
-
- gen_require(`
- type rtorrent_server_packet_t;
- ')
-
- dontaudit $1 rtorrent_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rtorrent_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive rtorrent_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_rtorrent_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_rtorrent_server_packets'($*)) dnl
-
- gen_require(`
- type rtorrent_server_packet_t;
- ')
-
- allow $1 rtorrent_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_rtorrent_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive rtorrent_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_rtorrent_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rtorrent_server_packets'($*)) dnl
-
- gen_require(`
- type rtorrent_server_packet_t;
- ')
-
- dontaudit $1 rtorrent_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rtorrent_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive rtorrent_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_rtorrent_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rtorrent_server_packets'($*)) dnl
-
- corenet_send_rtorrent_server_packets($1)
- corenet_receive_rtorrent_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rtorrent_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive rtorrent_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_rtorrent_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rtorrent_server_packets'($*)) dnl
-
- corenet_dontaudit_send_rtorrent_server_packets($1)
- corenet_dontaudit_receive_rtorrent_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rtorrent_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to rtorrent_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_rtorrent_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rtorrent_server_packets'($*)) dnl
-
- gen_require(`
- type rtorrent_server_packet_t;
- ')
-
- allow $1 rtorrent_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_rtorrent_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the rtsp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_rtsp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_rtsp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_rtsp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the rtsp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_rtsp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_rtsp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_rtsp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the rtsp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_rtsp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_rtsp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_rtsp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the rtsp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_rtsp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_rtsp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_rtsp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the rtsp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_rtsp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_rtsp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_rtsp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the rtsp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_rtsp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_rtsp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_rtsp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the rtsp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_rtsp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_rtsp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_rtsp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the rtsp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_rtsp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_rtsp_port'($*)) dnl
-
- gen_require(`
- type rtsp_port_t;
- ')
-
- allow $1 rtsp_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_rtsp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the rtsp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_rtsp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_rtsp_port'($*)) dnl
-
- gen_require(`
- type rtsp_port_t;
- ')
-
- allow $1 rtsp_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_rtsp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the rtsp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_rtsp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_rtsp_port'($*)) dnl
-
- gen_require(`
- type rtsp_port_t;
- ')
-
- allow $1 rtsp_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_rtsp_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send rtsp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_rtsp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_rtsp_client_packets'($*)) dnl
-
- gen_require(`
- type rtsp_client_packet_t;
- ')
-
- allow $1 rtsp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_rtsp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send rtsp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_rtsp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rtsp_client_packets'($*)) dnl
-
- gen_require(`
- type rtsp_client_packet_t;
- ')
-
- dontaudit $1 rtsp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rtsp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive rtsp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_rtsp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_rtsp_client_packets'($*)) dnl
-
- gen_require(`
- type rtsp_client_packet_t;
- ')
-
- allow $1 rtsp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_rtsp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive rtsp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_rtsp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rtsp_client_packets'($*)) dnl
-
- gen_require(`
- type rtsp_client_packet_t;
- ')
-
- dontaudit $1 rtsp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rtsp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive rtsp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_rtsp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rtsp_client_packets'($*)) dnl
-
- corenet_send_rtsp_client_packets($1)
- corenet_receive_rtsp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rtsp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive rtsp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_rtsp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rtsp_client_packets'($*)) dnl
-
- corenet_dontaudit_send_rtsp_client_packets($1)
- corenet_dontaudit_receive_rtsp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rtsp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to rtsp_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_rtsp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rtsp_client_packets'($*)) dnl
-
- gen_require(`
- type rtsp_client_packet_t;
- ')
-
- allow $1 rtsp_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_rtsp_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send rtsp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_rtsp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_rtsp_server_packets'($*)) dnl
-
- gen_require(`
- type rtsp_server_packet_t;
- ')
-
- allow $1 rtsp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_rtsp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send rtsp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_rtsp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rtsp_server_packets'($*)) dnl
-
- gen_require(`
- type rtsp_server_packet_t;
- ')
-
- dontaudit $1 rtsp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rtsp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive rtsp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_rtsp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_rtsp_server_packets'($*)) dnl
-
- gen_require(`
- type rtsp_server_packet_t;
- ')
-
- allow $1 rtsp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_rtsp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive rtsp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_rtsp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rtsp_server_packets'($*)) dnl
-
- gen_require(`
- type rtsp_server_packet_t;
- ')
-
- dontaudit $1 rtsp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rtsp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive rtsp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_rtsp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rtsp_server_packets'($*)) dnl
-
- corenet_send_rtsp_server_packets($1)
- corenet_receive_rtsp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rtsp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive rtsp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_rtsp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rtsp_server_packets'($*)) dnl
-
- corenet_dontaudit_send_rtsp_server_packets($1)
- corenet_dontaudit_receive_rtsp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rtsp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to rtsp_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_rtsp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rtsp_server_packets'($*)) dnl
-
- gen_require(`
- type rtsp_server_packet_t;
- ')
-
- allow $1 rtsp_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_rtsp_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the rwho port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_rwho_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_rwho_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_rwho_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the rwho port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_rwho_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_rwho_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_rwho_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the rwho port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_rwho_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_rwho_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_rwho_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the rwho port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_rwho_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_rwho_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_rwho_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the rwho port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_rwho_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_rwho_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_rwho_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the rwho port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_rwho_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_rwho_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_rwho_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the rwho port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_rwho_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_rwho_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_rwho_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the rwho port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_rwho_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_rwho_port'($*)) dnl
-
- gen_require(`
- type rwho_port_t;
- ')
-
- allow $1 rwho_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_rwho_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the rwho port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_rwho_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_rwho_port'($*)) dnl
-
- gen_require(`
- type rwho_port_t;
- ')
-
- allow $1 rwho_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_rwho_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the rwho port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_rwho_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_rwho_port'($*)) dnl
-
- gen_require(`
- type rwho_port_t;
- ')
-
- allow $1 rwho_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_rwho_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send rwho_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_rwho_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_rwho_client_packets'($*)) dnl
-
- gen_require(`
- type rwho_client_packet_t;
- ')
-
- allow $1 rwho_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_rwho_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send rwho_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_rwho_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rwho_client_packets'($*)) dnl
-
- gen_require(`
- type rwho_client_packet_t;
- ')
-
- dontaudit $1 rwho_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rwho_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive rwho_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_rwho_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_rwho_client_packets'($*)) dnl
-
- gen_require(`
- type rwho_client_packet_t;
- ')
-
- allow $1 rwho_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_rwho_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive rwho_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_rwho_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rwho_client_packets'($*)) dnl
-
- gen_require(`
- type rwho_client_packet_t;
- ')
-
- dontaudit $1 rwho_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rwho_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive rwho_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_rwho_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rwho_client_packets'($*)) dnl
-
- corenet_send_rwho_client_packets($1)
- corenet_receive_rwho_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rwho_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive rwho_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_rwho_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rwho_client_packets'($*)) dnl
-
- corenet_dontaudit_send_rwho_client_packets($1)
- corenet_dontaudit_receive_rwho_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rwho_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to rwho_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_rwho_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rwho_client_packets'($*)) dnl
-
- gen_require(`
- type rwho_client_packet_t;
- ')
-
- allow $1 rwho_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_rwho_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send rwho_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_rwho_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_rwho_server_packets'($*)) dnl
-
- gen_require(`
- type rwho_server_packet_t;
- ')
-
- allow $1 rwho_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_rwho_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send rwho_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_rwho_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rwho_server_packets'($*)) dnl
-
- gen_require(`
- type rwho_server_packet_t;
- ')
-
- dontaudit $1 rwho_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rwho_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive rwho_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_rwho_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_rwho_server_packets'($*)) dnl
-
- gen_require(`
- type rwho_server_packet_t;
- ')
-
- allow $1 rwho_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_rwho_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive rwho_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_rwho_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rwho_server_packets'($*)) dnl
-
- gen_require(`
- type rwho_server_packet_t;
- ')
-
- dontaudit $1 rwho_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rwho_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive rwho_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_rwho_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rwho_server_packets'($*)) dnl
-
- corenet_send_rwho_server_packets($1)
- corenet_receive_rwho_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rwho_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive rwho_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_rwho_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rwho_server_packets'($*)) dnl
-
- corenet_dontaudit_send_rwho_server_packets($1)
- corenet_dontaudit_receive_rwho_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rwho_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to rwho_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_rwho_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rwho_server_packets'($*)) dnl
-
- gen_require(`
- type rwho_server_packet_t;
- ')
-
- allow $1 rwho_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_rwho_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the salt port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_salt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_salt_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_salt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the salt port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_salt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_salt_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_salt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the salt port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_salt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_salt_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_salt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the salt port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_salt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_salt_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_salt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the salt port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_salt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_salt_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_salt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the salt port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_salt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_salt_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_salt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the salt port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_salt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_salt_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_salt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the salt port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_salt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_salt_port'($*)) dnl
-
- gen_require(`
- type salt_port_t;
- ')
-
- allow $1 salt_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_salt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the salt port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_salt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_salt_port'($*)) dnl
-
- gen_require(`
- type salt_port_t;
- ')
-
- allow $1 salt_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_salt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the salt port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_salt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_salt_port'($*)) dnl
-
- gen_require(`
- type salt_port_t;
- ')
-
- allow $1 salt_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_salt_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send salt_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_salt_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_salt_client_packets'($*)) dnl
-
- gen_require(`
- type salt_client_packet_t;
- ')
-
- allow $1 salt_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_salt_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send salt_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_salt_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_salt_client_packets'($*)) dnl
-
- gen_require(`
- type salt_client_packet_t;
- ')
-
- dontaudit $1 salt_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_salt_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive salt_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_salt_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_salt_client_packets'($*)) dnl
-
- gen_require(`
- type salt_client_packet_t;
- ')
-
- allow $1 salt_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_salt_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive salt_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_salt_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_salt_client_packets'($*)) dnl
-
- gen_require(`
- type salt_client_packet_t;
- ')
-
- dontaudit $1 salt_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_salt_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive salt_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_salt_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_salt_client_packets'($*)) dnl
-
- corenet_send_salt_client_packets($1)
- corenet_receive_salt_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_salt_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive salt_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_salt_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_salt_client_packets'($*)) dnl
-
- corenet_dontaudit_send_salt_client_packets($1)
- corenet_dontaudit_receive_salt_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_salt_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to salt_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_salt_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_salt_client_packets'($*)) dnl
-
- gen_require(`
- type salt_client_packet_t;
- ')
-
- allow $1 salt_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_salt_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send salt_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_salt_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_salt_server_packets'($*)) dnl
-
- gen_require(`
- type salt_server_packet_t;
- ')
-
- allow $1 salt_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_salt_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send salt_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_salt_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_salt_server_packets'($*)) dnl
-
- gen_require(`
- type salt_server_packet_t;
- ')
-
- dontaudit $1 salt_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_salt_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive salt_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_salt_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_salt_server_packets'($*)) dnl
-
- gen_require(`
- type salt_server_packet_t;
- ')
-
- allow $1 salt_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_salt_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive salt_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_salt_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_salt_server_packets'($*)) dnl
-
- gen_require(`
- type salt_server_packet_t;
- ')
-
- dontaudit $1 salt_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_salt_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive salt_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_salt_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_salt_server_packets'($*)) dnl
-
- corenet_send_salt_server_packets($1)
- corenet_receive_salt_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_salt_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive salt_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_salt_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_salt_server_packets'($*)) dnl
-
- corenet_dontaudit_send_salt_server_packets($1)
- corenet_dontaudit_receive_salt_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_salt_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to salt_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_salt_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_salt_server_packets'($*)) dnl
-
- gen_require(`
- type salt_server_packet_t;
- ')
-
- allow $1 salt_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_salt_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the sap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_sap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_sap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_sap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the sap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_sap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_sap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_sap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the sap port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_sap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_sap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_sap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the sap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_sap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_sap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_sap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the sap port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_sap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_sap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_sap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the sap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_sap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_sap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_sap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the sap port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_sap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_sap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_sap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the sap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_sap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_sap_port'($*)) dnl
-
- gen_require(`
- type sap_port_t;
- ')
-
- allow $1 sap_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_sap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the sap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_sap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_sap_port'($*)) dnl
-
- gen_require(`
- type sap_port_t;
- ')
-
- allow $1 sap_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_sap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the sap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_sap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_sap_port'($*)) dnl
-
- gen_require(`
- type sap_port_t;
- ')
-
- allow $1 sap_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_sap_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send sap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_sap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_sap_client_packets'($*)) dnl
-
- gen_require(`
- type sap_client_packet_t;
- ')
-
- allow $1 sap_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_sap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send sap_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_sap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_sap_client_packets'($*)) dnl
-
- gen_require(`
- type sap_client_packet_t;
- ')
-
- dontaudit $1 sap_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_sap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive sap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_sap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_sap_client_packets'($*)) dnl
-
- gen_require(`
- type sap_client_packet_t;
- ')
-
- allow $1 sap_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_sap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive sap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_sap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_sap_client_packets'($*)) dnl
-
- gen_require(`
- type sap_client_packet_t;
- ')
-
- dontaudit $1 sap_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_sap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive sap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_sap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_sap_client_packets'($*)) dnl
-
- corenet_send_sap_client_packets($1)
- corenet_receive_sap_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_sap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive sap_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_sap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_sap_client_packets'($*)) dnl
-
- corenet_dontaudit_send_sap_client_packets($1)
- corenet_dontaudit_receive_sap_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_sap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to sap_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_sap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_sap_client_packets'($*)) dnl
-
- gen_require(`
- type sap_client_packet_t;
- ')
-
- allow $1 sap_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_sap_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send sap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_sap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_sap_server_packets'($*)) dnl
-
- gen_require(`
- type sap_server_packet_t;
- ')
-
- allow $1 sap_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_sap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send sap_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_sap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_sap_server_packets'($*)) dnl
-
- gen_require(`
- type sap_server_packet_t;
- ')
-
- dontaudit $1 sap_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_sap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive sap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_sap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_sap_server_packets'($*)) dnl
-
- gen_require(`
- type sap_server_packet_t;
- ')
-
- allow $1 sap_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_sap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive sap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_sap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_sap_server_packets'($*)) dnl
-
- gen_require(`
- type sap_server_packet_t;
- ')
-
- dontaudit $1 sap_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_sap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive sap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_sap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_sap_server_packets'($*)) dnl
-
- corenet_send_sap_server_packets($1)
- corenet_receive_sap_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_sap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive sap_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_sap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_sap_server_packets'($*)) dnl
-
- corenet_dontaudit_send_sap_server_packets($1)
- corenet_dontaudit_receive_sap_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_sap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to sap_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_sap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_sap_server_packets'($*)) dnl
-
- gen_require(`
- type sap_server_packet_t;
- ')
-
- allow $1 sap_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_sap_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the servistaitsm port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_servistaitsm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_servistaitsm_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_servistaitsm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the servistaitsm port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_servistaitsm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_servistaitsm_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_servistaitsm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the servistaitsm port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_servistaitsm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_servistaitsm_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_servistaitsm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the servistaitsm port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_servistaitsm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_servistaitsm_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_servistaitsm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the servistaitsm port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_servistaitsm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_servistaitsm_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_servistaitsm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the servistaitsm port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_servistaitsm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_servistaitsm_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_servistaitsm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the servistaitsm port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_servistaitsm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_servistaitsm_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_servistaitsm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the servistaitsm port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_servistaitsm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_servistaitsm_port'($*)) dnl
-
- gen_require(`
- type servistaitsm_port_t;
- ')
-
- allow $1 servistaitsm_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_servistaitsm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the servistaitsm port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_servistaitsm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_servistaitsm_port'($*)) dnl
-
- gen_require(`
- type servistaitsm_port_t;
- ')
-
- allow $1 servistaitsm_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_servistaitsm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the servistaitsm port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_servistaitsm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_servistaitsm_port'($*)) dnl
-
- gen_require(`
- type servistaitsm_port_t;
- ')
-
- allow $1 servistaitsm_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_servistaitsm_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send servistaitsm_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_servistaitsm_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_servistaitsm_client_packets'($*)) dnl
-
- gen_require(`
- type servistaitsm_client_packet_t;
- ')
-
- allow $1 servistaitsm_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_servistaitsm_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send servistaitsm_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_servistaitsm_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_servistaitsm_client_packets'($*)) dnl
-
- gen_require(`
- type servistaitsm_client_packet_t;
- ')
-
- dontaudit $1 servistaitsm_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_servistaitsm_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive servistaitsm_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_servistaitsm_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_servistaitsm_client_packets'($*)) dnl
-
- gen_require(`
- type servistaitsm_client_packet_t;
- ')
-
- allow $1 servistaitsm_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_servistaitsm_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive servistaitsm_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_servistaitsm_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_servistaitsm_client_packets'($*)) dnl
-
- gen_require(`
- type servistaitsm_client_packet_t;
- ')
-
- dontaudit $1 servistaitsm_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_servistaitsm_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive servistaitsm_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_servistaitsm_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_servistaitsm_client_packets'($*)) dnl
-
- corenet_send_servistaitsm_client_packets($1)
- corenet_receive_servistaitsm_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_servistaitsm_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive servistaitsm_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_servistaitsm_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_servistaitsm_client_packets'($*)) dnl
-
- corenet_dontaudit_send_servistaitsm_client_packets($1)
- corenet_dontaudit_receive_servistaitsm_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_servistaitsm_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to servistaitsm_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_servistaitsm_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_servistaitsm_client_packets'($*)) dnl
-
- gen_require(`
- type servistaitsm_client_packet_t;
- ')
-
- allow $1 servistaitsm_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_servistaitsm_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send servistaitsm_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_servistaitsm_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_servistaitsm_server_packets'($*)) dnl
-
- gen_require(`
- type servistaitsm_server_packet_t;
- ')
-
- allow $1 servistaitsm_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_servistaitsm_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send servistaitsm_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_servistaitsm_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_servistaitsm_server_packets'($*)) dnl
-
- gen_require(`
- type servistaitsm_server_packet_t;
- ')
-
- dontaudit $1 servistaitsm_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_servistaitsm_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive servistaitsm_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_servistaitsm_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_servistaitsm_server_packets'($*)) dnl
-
- gen_require(`
- type servistaitsm_server_packet_t;
- ')
-
- allow $1 servistaitsm_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_servistaitsm_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive servistaitsm_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_servistaitsm_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_servistaitsm_server_packets'($*)) dnl
-
- gen_require(`
- type servistaitsm_server_packet_t;
- ')
-
- dontaudit $1 servistaitsm_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_servistaitsm_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive servistaitsm_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_servistaitsm_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_servistaitsm_server_packets'($*)) dnl
-
- corenet_send_servistaitsm_server_packets($1)
- corenet_receive_servistaitsm_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_servistaitsm_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive servistaitsm_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_servistaitsm_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_servistaitsm_server_packets'($*)) dnl
-
- corenet_dontaudit_send_servistaitsm_server_packets($1)
- corenet_dontaudit_receive_servistaitsm_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_servistaitsm_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to servistaitsm_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_servistaitsm_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_servistaitsm_server_packets'($*)) dnl
-
- gen_require(`
- type servistaitsm_server_packet_t;
- ')
-
- allow $1 servistaitsm_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_servistaitsm_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the sieve port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_sieve_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_sieve_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_sieve_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the sieve port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_sieve_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_sieve_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_sieve_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the sieve port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_sieve_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_sieve_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_sieve_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the sieve port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_sieve_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_sieve_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_sieve_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the sieve port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_sieve_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_sieve_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_sieve_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the sieve port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_sieve_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_sieve_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_sieve_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the sieve port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_sieve_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_sieve_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_sieve_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the sieve port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_sieve_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_sieve_port'($*)) dnl
-
- gen_require(`
- type sieve_port_t;
- ')
-
- allow $1 sieve_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_sieve_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the sieve port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_sieve_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_sieve_port'($*)) dnl
-
- gen_require(`
- type sieve_port_t;
- ')
-
- allow $1 sieve_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_sieve_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the sieve port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_sieve_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_sieve_port'($*)) dnl
-
- gen_require(`
- type sieve_port_t;
- ')
-
- allow $1 sieve_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_sieve_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send sieve_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_sieve_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_sieve_client_packets'($*)) dnl
-
- gen_require(`
- type sieve_client_packet_t;
- ')
-
- allow $1 sieve_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_sieve_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send sieve_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_sieve_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_sieve_client_packets'($*)) dnl
-
- gen_require(`
- type sieve_client_packet_t;
- ')
-
- dontaudit $1 sieve_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_sieve_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive sieve_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_sieve_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_sieve_client_packets'($*)) dnl
-
- gen_require(`
- type sieve_client_packet_t;
- ')
-
- allow $1 sieve_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_sieve_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive sieve_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_sieve_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_sieve_client_packets'($*)) dnl
-
- gen_require(`
- type sieve_client_packet_t;
- ')
-
- dontaudit $1 sieve_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_sieve_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive sieve_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_sieve_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_sieve_client_packets'($*)) dnl
-
- corenet_send_sieve_client_packets($1)
- corenet_receive_sieve_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_sieve_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive sieve_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_sieve_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_sieve_client_packets'($*)) dnl
-
- corenet_dontaudit_send_sieve_client_packets($1)
- corenet_dontaudit_receive_sieve_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_sieve_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to sieve_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_sieve_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_sieve_client_packets'($*)) dnl
-
- gen_require(`
- type sieve_client_packet_t;
- ')
-
- allow $1 sieve_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_sieve_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send sieve_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_sieve_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_sieve_server_packets'($*)) dnl
-
- gen_require(`
- type sieve_server_packet_t;
- ')
-
- allow $1 sieve_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_sieve_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send sieve_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_sieve_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_sieve_server_packets'($*)) dnl
-
- gen_require(`
- type sieve_server_packet_t;
- ')
-
- dontaudit $1 sieve_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_sieve_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive sieve_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_sieve_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_sieve_server_packets'($*)) dnl
-
- gen_require(`
- type sieve_server_packet_t;
- ')
-
- allow $1 sieve_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_sieve_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive sieve_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_sieve_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_sieve_server_packets'($*)) dnl
-
- gen_require(`
- type sieve_server_packet_t;
- ')
-
- dontaudit $1 sieve_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_sieve_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive sieve_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_sieve_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_sieve_server_packets'($*)) dnl
-
- corenet_send_sieve_server_packets($1)
- corenet_receive_sieve_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_sieve_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive sieve_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_sieve_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_sieve_server_packets'($*)) dnl
-
- corenet_dontaudit_send_sieve_server_packets($1)
- corenet_dontaudit_receive_sieve_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_sieve_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to sieve_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_sieve_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_sieve_server_packets'($*)) dnl
-
- gen_require(`
- type sieve_server_packet_t;
- ')
-
- allow $1 sieve_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_sieve_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the sip port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_sip_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_sip_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_sip_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the sip port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_sip_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_sip_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_sip_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the sip port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_sip_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_sip_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_sip_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the sip port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_sip_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_sip_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_sip_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the sip port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_sip_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_sip_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_sip_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the sip port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_sip_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_sip_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_sip_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the sip port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_sip_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_sip_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_sip_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the sip port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_sip_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_sip_port'($*)) dnl
-
- gen_require(`
- type sip_port_t;
- ')
-
- allow $1 sip_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_sip_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the sip port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_sip_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_sip_port'($*)) dnl
-
- gen_require(`
- type sip_port_t;
- ')
-
- allow $1 sip_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_sip_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the sip port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_sip_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_sip_port'($*)) dnl
-
- gen_require(`
- type sip_port_t;
- ')
-
- allow $1 sip_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_sip_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send sip_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_sip_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_sip_client_packets'($*)) dnl
-
- gen_require(`
- type sip_client_packet_t;
- ')
-
- allow $1 sip_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_sip_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send sip_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_sip_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_sip_client_packets'($*)) dnl
-
- gen_require(`
- type sip_client_packet_t;
- ')
-
- dontaudit $1 sip_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_sip_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive sip_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_sip_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_sip_client_packets'($*)) dnl
-
- gen_require(`
- type sip_client_packet_t;
- ')
-
- allow $1 sip_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_sip_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive sip_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_sip_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_sip_client_packets'($*)) dnl
-
- gen_require(`
- type sip_client_packet_t;
- ')
-
- dontaudit $1 sip_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_sip_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive sip_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_sip_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_sip_client_packets'($*)) dnl
-
- corenet_send_sip_client_packets($1)
- corenet_receive_sip_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_sip_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive sip_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_sip_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_sip_client_packets'($*)) dnl
-
- corenet_dontaudit_send_sip_client_packets($1)
- corenet_dontaudit_receive_sip_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_sip_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to sip_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_sip_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_sip_client_packets'($*)) dnl
-
- gen_require(`
- type sip_client_packet_t;
- ')
-
- allow $1 sip_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_sip_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send sip_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_sip_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_sip_server_packets'($*)) dnl
-
- gen_require(`
- type sip_server_packet_t;
- ')
-
- allow $1 sip_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_sip_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send sip_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_sip_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_sip_server_packets'($*)) dnl
-
- gen_require(`
- type sip_server_packet_t;
- ')
-
- dontaudit $1 sip_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_sip_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive sip_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_sip_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_sip_server_packets'($*)) dnl
-
- gen_require(`
- type sip_server_packet_t;
- ')
-
- allow $1 sip_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_sip_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive sip_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_sip_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_sip_server_packets'($*)) dnl
-
- gen_require(`
- type sip_server_packet_t;
- ')
-
- dontaudit $1 sip_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_sip_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive sip_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_sip_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_sip_server_packets'($*)) dnl
-
- corenet_send_sip_server_packets($1)
- corenet_receive_sip_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_sip_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive sip_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_sip_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_sip_server_packets'($*)) dnl
-
- corenet_dontaudit_send_sip_server_packets($1)
- corenet_dontaudit_receive_sip_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_sip_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to sip_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_sip_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_sip_server_packets'($*)) dnl
-
- gen_require(`
- type sip_server_packet_t;
- ')
-
- allow $1 sip_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_sip_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the sixxsconfig port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_sixxsconfig_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_sixxsconfig_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_sixxsconfig_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the sixxsconfig port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_sixxsconfig_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_sixxsconfig_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_sixxsconfig_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the sixxsconfig port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_sixxsconfig_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_sixxsconfig_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_sixxsconfig_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the sixxsconfig port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_sixxsconfig_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_sixxsconfig_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_sixxsconfig_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the sixxsconfig port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_sixxsconfig_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_sixxsconfig_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_sixxsconfig_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the sixxsconfig port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_sixxsconfig_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_sixxsconfig_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_sixxsconfig_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the sixxsconfig port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_sixxsconfig_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_sixxsconfig_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_sixxsconfig_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the sixxsconfig port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_sixxsconfig_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_sixxsconfig_port'($*)) dnl
-
- gen_require(`
- type sixxsconfig_port_t;
- ')
-
- allow $1 sixxsconfig_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_sixxsconfig_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the sixxsconfig port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_sixxsconfig_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_sixxsconfig_port'($*)) dnl
-
- gen_require(`
- type sixxsconfig_port_t;
- ')
-
- allow $1 sixxsconfig_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_sixxsconfig_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the sixxsconfig port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_sixxsconfig_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_sixxsconfig_port'($*)) dnl
-
- gen_require(`
- type sixxsconfig_port_t;
- ')
-
- allow $1 sixxsconfig_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_sixxsconfig_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send sixxsconfig_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_sixxsconfig_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_sixxsconfig_client_packets'($*)) dnl
-
- gen_require(`
- type sixxsconfig_client_packet_t;
- ')
-
- allow $1 sixxsconfig_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_sixxsconfig_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send sixxsconfig_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_sixxsconfig_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_sixxsconfig_client_packets'($*)) dnl
-
- gen_require(`
- type sixxsconfig_client_packet_t;
- ')
-
- dontaudit $1 sixxsconfig_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_sixxsconfig_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive sixxsconfig_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_sixxsconfig_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_sixxsconfig_client_packets'($*)) dnl
-
- gen_require(`
- type sixxsconfig_client_packet_t;
- ')
-
- allow $1 sixxsconfig_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_sixxsconfig_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive sixxsconfig_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_sixxsconfig_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_sixxsconfig_client_packets'($*)) dnl
-
- gen_require(`
- type sixxsconfig_client_packet_t;
- ')
-
- dontaudit $1 sixxsconfig_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_sixxsconfig_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive sixxsconfig_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_sixxsconfig_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_sixxsconfig_client_packets'($*)) dnl
-
- corenet_send_sixxsconfig_client_packets($1)
- corenet_receive_sixxsconfig_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_sixxsconfig_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive sixxsconfig_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_sixxsconfig_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_sixxsconfig_client_packets'($*)) dnl
-
- corenet_dontaudit_send_sixxsconfig_client_packets($1)
- corenet_dontaudit_receive_sixxsconfig_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_sixxsconfig_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to sixxsconfig_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_sixxsconfig_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_sixxsconfig_client_packets'($*)) dnl
-
- gen_require(`
- type sixxsconfig_client_packet_t;
- ')
-
- allow $1 sixxsconfig_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_sixxsconfig_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send sixxsconfig_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_sixxsconfig_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_sixxsconfig_server_packets'($*)) dnl
-
- gen_require(`
- type sixxsconfig_server_packet_t;
- ')
-
- allow $1 sixxsconfig_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_sixxsconfig_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send sixxsconfig_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_sixxsconfig_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_sixxsconfig_server_packets'($*)) dnl
-
- gen_require(`
- type sixxsconfig_server_packet_t;
- ')
-
- dontaudit $1 sixxsconfig_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_sixxsconfig_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive sixxsconfig_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_sixxsconfig_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_sixxsconfig_server_packets'($*)) dnl
-
- gen_require(`
- type sixxsconfig_server_packet_t;
- ')
-
- allow $1 sixxsconfig_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_sixxsconfig_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive sixxsconfig_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_sixxsconfig_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_sixxsconfig_server_packets'($*)) dnl
-
- gen_require(`
- type sixxsconfig_server_packet_t;
- ')
-
- dontaudit $1 sixxsconfig_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_sixxsconfig_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive sixxsconfig_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_sixxsconfig_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_sixxsconfig_server_packets'($*)) dnl
-
- corenet_send_sixxsconfig_server_packets($1)
- corenet_receive_sixxsconfig_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_sixxsconfig_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive sixxsconfig_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_sixxsconfig_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_sixxsconfig_server_packets'($*)) dnl
-
- corenet_dontaudit_send_sixxsconfig_server_packets($1)
- corenet_dontaudit_receive_sixxsconfig_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_sixxsconfig_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to sixxsconfig_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_sixxsconfig_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_sixxsconfig_server_packets'($*)) dnl
-
- gen_require(`
- type sixxsconfig_server_packet_t;
- ')
-
- allow $1 sixxsconfig_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_sixxsconfig_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the smbd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_smbd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_smbd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_smbd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the smbd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_smbd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_smbd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_smbd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the smbd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_smbd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_smbd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_smbd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the smbd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_smbd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_smbd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_smbd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the smbd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_smbd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_smbd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_smbd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the smbd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_smbd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_smbd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_smbd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the smbd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_smbd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_smbd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_smbd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the smbd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_smbd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_smbd_port'($*)) dnl
-
- gen_require(`
- type smbd_port_t;
- ')
-
- allow $1 smbd_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_smbd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the smbd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_smbd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_smbd_port'($*)) dnl
-
- gen_require(`
- type smbd_port_t;
- ')
-
- allow $1 smbd_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_smbd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the smbd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_smbd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_smbd_port'($*)) dnl
-
- gen_require(`
- type smbd_port_t;
- ')
-
- allow $1 smbd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_smbd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send smbd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_smbd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_smbd_client_packets'($*)) dnl
-
- gen_require(`
- type smbd_client_packet_t;
- ')
-
- allow $1 smbd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_smbd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send smbd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_smbd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_smbd_client_packets'($*)) dnl
-
- gen_require(`
- type smbd_client_packet_t;
- ')
-
- dontaudit $1 smbd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_smbd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive smbd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_smbd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_smbd_client_packets'($*)) dnl
-
- gen_require(`
- type smbd_client_packet_t;
- ')
-
- allow $1 smbd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_smbd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive smbd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_smbd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_smbd_client_packets'($*)) dnl
-
- gen_require(`
- type smbd_client_packet_t;
- ')
-
- dontaudit $1 smbd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_smbd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive smbd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_smbd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_smbd_client_packets'($*)) dnl
-
- corenet_send_smbd_client_packets($1)
- corenet_receive_smbd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_smbd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive smbd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_smbd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_smbd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_smbd_client_packets($1)
- corenet_dontaudit_receive_smbd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_smbd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to smbd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_smbd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_smbd_client_packets'($*)) dnl
-
- gen_require(`
- type smbd_client_packet_t;
- ')
-
- allow $1 smbd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_smbd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send smbd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_smbd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_smbd_server_packets'($*)) dnl
-
- gen_require(`
- type smbd_server_packet_t;
- ')
-
- allow $1 smbd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_smbd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send smbd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_smbd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_smbd_server_packets'($*)) dnl
-
- gen_require(`
- type smbd_server_packet_t;
- ')
-
- dontaudit $1 smbd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_smbd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive smbd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_smbd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_smbd_server_packets'($*)) dnl
-
- gen_require(`
- type smbd_server_packet_t;
- ')
-
- allow $1 smbd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_smbd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive smbd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_smbd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_smbd_server_packets'($*)) dnl
-
- gen_require(`
- type smbd_server_packet_t;
- ')
-
- dontaudit $1 smbd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_smbd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive smbd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_smbd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_smbd_server_packets'($*)) dnl
-
- corenet_send_smbd_server_packets($1)
- corenet_receive_smbd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_smbd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive smbd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_smbd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_smbd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_smbd_server_packets($1)
- corenet_dontaudit_receive_smbd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_smbd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to smbd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_smbd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_smbd_server_packets'($*)) dnl
-
- gen_require(`
- type smbd_server_packet_t;
- ')
-
- allow $1 smbd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_smbd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the smtp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_smtp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_smtp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_smtp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the smtp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_smtp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_smtp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_smtp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the smtp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_smtp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_smtp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_smtp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the smtp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_smtp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_smtp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_smtp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the smtp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_smtp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_smtp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_smtp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the smtp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_smtp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_smtp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_smtp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the smtp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_smtp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_smtp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_smtp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the smtp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_smtp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_smtp_port'($*)) dnl
-
- gen_require(`
- type smtp_port_t;
- ')
-
- allow $1 smtp_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_smtp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the smtp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_smtp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_smtp_port'($*)) dnl
-
- gen_require(`
- type smtp_port_t;
- ')
-
- allow $1 smtp_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_smtp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the smtp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_smtp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_smtp_port'($*)) dnl
-
- gen_require(`
- type smtp_port_t;
- ')
-
- allow $1 smtp_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_smtp_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send smtp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_smtp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_smtp_client_packets'($*)) dnl
-
- gen_require(`
- type smtp_client_packet_t;
- ')
-
- allow $1 smtp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_smtp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send smtp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_smtp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_smtp_client_packets'($*)) dnl
-
- gen_require(`
- type smtp_client_packet_t;
- ')
-
- dontaudit $1 smtp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_smtp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive smtp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_smtp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_smtp_client_packets'($*)) dnl
-
- gen_require(`
- type smtp_client_packet_t;
- ')
-
- allow $1 smtp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_smtp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive smtp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_smtp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_smtp_client_packets'($*)) dnl
-
- gen_require(`
- type smtp_client_packet_t;
- ')
-
- dontaudit $1 smtp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_smtp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive smtp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_smtp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_smtp_client_packets'($*)) dnl
-
- corenet_send_smtp_client_packets($1)
- corenet_receive_smtp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_smtp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive smtp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_smtp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_smtp_client_packets'($*)) dnl
-
- corenet_dontaudit_send_smtp_client_packets($1)
- corenet_dontaudit_receive_smtp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_smtp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to smtp_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_smtp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_smtp_client_packets'($*)) dnl
-
- gen_require(`
- type smtp_client_packet_t;
- ')
-
- allow $1 smtp_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_smtp_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send smtp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_smtp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_smtp_server_packets'($*)) dnl
-
- gen_require(`
- type smtp_server_packet_t;
- ')
-
- allow $1 smtp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_smtp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send smtp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_smtp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_smtp_server_packets'($*)) dnl
-
- gen_require(`
- type smtp_server_packet_t;
- ')
-
- dontaudit $1 smtp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_smtp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive smtp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_smtp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_smtp_server_packets'($*)) dnl
-
- gen_require(`
- type smtp_server_packet_t;
- ')
-
- allow $1 smtp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_smtp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive smtp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_smtp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_smtp_server_packets'($*)) dnl
-
- gen_require(`
- type smtp_server_packet_t;
- ')
-
- dontaudit $1 smtp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_smtp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive smtp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_smtp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_smtp_server_packets'($*)) dnl
-
- corenet_send_smtp_server_packets($1)
- corenet_receive_smtp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_smtp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive smtp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_smtp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_smtp_server_packets'($*)) dnl
-
- corenet_dontaudit_send_smtp_server_packets($1)
- corenet_dontaudit_receive_smtp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_smtp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to smtp_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_smtp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_smtp_server_packets'($*)) dnl
-
- gen_require(`
- type smtp_server_packet_t;
- ')
-
- allow $1 smtp_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_smtp_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the snmp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_snmp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_snmp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_snmp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the snmp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_snmp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_snmp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_snmp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the snmp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_snmp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_snmp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_snmp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the snmp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_snmp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_snmp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_snmp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the snmp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_snmp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_snmp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_snmp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the snmp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_snmp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_snmp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_snmp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the snmp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_snmp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_snmp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_snmp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the snmp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_snmp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_snmp_port'($*)) dnl
-
- gen_require(`
- type snmp_port_t;
- ')
-
- allow $1 snmp_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_snmp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the snmp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_snmp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_snmp_port'($*)) dnl
-
- gen_require(`
- type snmp_port_t;
- ')
-
- allow $1 snmp_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_snmp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the snmp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_snmp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_snmp_port'($*)) dnl
-
- gen_require(`
- type snmp_port_t;
- ')
-
- allow $1 snmp_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_snmp_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send snmp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_snmp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_snmp_client_packets'($*)) dnl
-
- gen_require(`
- type snmp_client_packet_t;
- ')
-
- allow $1 snmp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_snmp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send snmp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_snmp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_snmp_client_packets'($*)) dnl
-
- gen_require(`
- type snmp_client_packet_t;
- ')
-
- dontaudit $1 snmp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_snmp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive snmp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_snmp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_snmp_client_packets'($*)) dnl
-
- gen_require(`
- type snmp_client_packet_t;
- ')
-
- allow $1 snmp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_snmp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive snmp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_snmp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_snmp_client_packets'($*)) dnl
-
- gen_require(`
- type snmp_client_packet_t;
- ')
-
- dontaudit $1 snmp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_snmp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive snmp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_snmp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_snmp_client_packets'($*)) dnl
-
- corenet_send_snmp_client_packets($1)
- corenet_receive_snmp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_snmp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive snmp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_snmp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_snmp_client_packets'($*)) dnl
-
- corenet_dontaudit_send_snmp_client_packets($1)
- corenet_dontaudit_receive_snmp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_snmp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to snmp_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_snmp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_snmp_client_packets'($*)) dnl
-
- gen_require(`
- type snmp_client_packet_t;
- ')
-
- allow $1 snmp_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_snmp_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send snmp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_snmp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_snmp_server_packets'($*)) dnl
-
- gen_require(`
- type snmp_server_packet_t;
- ')
-
- allow $1 snmp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_snmp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send snmp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_snmp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_snmp_server_packets'($*)) dnl
-
- gen_require(`
- type snmp_server_packet_t;
- ')
-
- dontaudit $1 snmp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_snmp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive snmp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_snmp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_snmp_server_packets'($*)) dnl
-
- gen_require(`
- type snmp_server_packet_t;
- ')
-
- allow $1 snmp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_snmp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive snmp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_snmp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_snmp_server_packets'($*)) dnl
-
- gen_require(`
- type snmp_server_packet_t;
- ')
-
- dontaudit $1 snmp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_snmp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive snmp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_snmp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_snmp_server_packets'($*)) dnl
-
- corenet_send_snmp_server_packets($1)
- corenet_receive_snmp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_snmp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive snmp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_snmp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_snmp_server_packets'($*)) dnl
-
- corenet_dontaudit_send_snmp_server_packets($1)
- corenet_dontaudit_receive_snmp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_snmp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to snmp_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_snmp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_snmp_server_packets'($*)) dnl
-
- gen_require(`
- type snmp_server_packet_t;
- ')
-
- allow $1 snmp_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_snmp_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the socks port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_socks_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_socks_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_socks_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the socks port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_socks_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_socks_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_socks_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the socks port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_socks_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_socks_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_socks_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the socks port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_socks_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_socks_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_socks_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the socks port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_socks_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_socks_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_socks_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the socks port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_socks_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_socks_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_socks_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the socks port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_socks_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_socks_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_socks_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the socks port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_socks_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_socks_port'($*)) dnl
-
- gen_require(`
- type socks_port_t;
- ')
-
- allow $1 socks_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_socks_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the socks port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_socks_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_socks_port'($*)) dnl
-
- gen_require(`
- type socks_port_t;
- ')
-
- allow $1 socks_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_socks_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the socks port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_socks_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_socks_port'($*)) dnl
-
- gen_require(`
- type socks_port_t;
- ')
-
- allow $1 socks_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_socks_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send socks_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_socks_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_socks_client_packets'($*)) dnl
-
- gen_require(`
- type socks_client_packet_t;
- ')
-
- allow $1 socks_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_socks_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send socks_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_socks_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_socks_client_packets'($*)) dnl
-
- gen_require(`
- type socks_client_packet_t;
- ')
-
- dontaudit $1 socks_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_socks_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive socks_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_socks_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_socks_client_packets'($*)) dnl
-
- gen_require(`
- type socks_client_packet_t;
- ')
-
- allow $1 socks_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_socks_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive socks_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_socks_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_socks_client_packets'($*)) dnl
-
- gen_require(`
- type socks_client_packet_t;
- ')
-
- dontaudit $1 socks_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_socks_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive socks_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_socks_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_socks_client_packets'($*)) dnl
-
- corenet_send_socks_client_packets($1)
- corenet_receive_socks_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_socks_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive socks_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_socks_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_socks_client_packets'($*)) dnl
-
- corenet_dontaudit_send_socks_client_packets($1)
- corenet_dontaudit_receive_socks_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_socks_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to socks_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_socks_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_socks_client_packets'($*)) dnl
-
- gen_require(`
- type socks_client_packet_t;
- ')
-
- allow $1 socks_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_socks_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send socks_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_socks_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_socks_server_packets'($*)) dnl
-
- gen_require(`
- type socks_server_packet_t;
- ')
-
- allow $1 socks_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_socks_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send socks_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_socks_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_socks_server_packets'($*)) dnl
-
- gen_require(`
- type socks_server_packet_t;
- ')
-
- dontaudit $1 socks_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_socks_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive socks_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_socks_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_socks_server_packets'($*)) dnl
-
- gen_require(`
- type socks_server_packet_t;
- ')
-
- allow $1 socks_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_socks_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive socks_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_socks_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_socks_server_packets'($*)) dnl
-
- gen_require(`
- type socks_server_packet_t;
- ')
-
- dontaudit $1 socks_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_socks_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive socks_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_socks_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_socks_server_packets'($*)) dnl
-
- corenet_send_socks_server_packets($1)
- corenet_receive_socks_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_socks_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive socks_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_socks_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_socks_server_packets'($*)) dnl
-
- corenet_dontaudit_send_socks_server_packets($1)
- corenet_dontaudit_receive_socks_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_socks_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to socks_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_socks_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_socks_server_packets'($*)) dnl
-
- gen_require(`
- type socks_server_packet_t;
- ')
-
- allow $1 socks_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_socks_server_packets'($*)) dnl
- ')
-
-
- # no defined portcon
-
-
-########################################
-##
-## Send and receive TCP traffic on the soundd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_soundd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_soundd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_soundd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the soundd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_soundd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_soundd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_soundd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the soundd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_soundd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_soundd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_soundd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the soundd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_soundd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_soundd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_soundd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the soundd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_soundd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_soundd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_soundd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the soundd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_soundd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_soundd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_soundd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the soundd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_soundd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_soundd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_soundd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the soundd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_soundd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_soundd_port'($*)) dnl
-
- gen_require(`
- type soundd_port_t;
- ')
-
- allow $1 soundd_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_soundd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the soundd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_soundd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_soundd_port'($*)) dnl
-
- gen_require(`
- type soundd_port_t;
- ')
-
- allow $1 soundd_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_soundd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the soundd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_soundd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_soundd_port'($*)) dnl
-
- gen_require(`
- type soundd_port_t;
- ')
-
- allow $1 soundd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_soundd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send soundd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_soundd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_soundd_client_packets'($*)) dnl
-
- gen_require(`
- type soundd_client_packet_t;
- ')
-
- allow $1 soundd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_soundd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send soundd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_soundd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_soundd_client_packets'($*)) dnl
-
- gen_require(`
- type soundd_client_packet_t;
- ')
-
- dontaudit $1 soundd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_soundd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive soundd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_soundd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_soundd_client_packets'($*)) dnl
-
- gen_require(`
- type soundd_client_packet_t;
- ')
-
- allow $1 soundd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_soundd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive soundd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_soundd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_soundd_client_packets'($*)) dnl
-
- gen_require(`
- type soundd_client_packet_t;
- ')
-
- dontaudit $1 soundd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_soundd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive soundd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_soundd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_soundd_client_packets'($*)) dnl
-
- corenet_send_soundd_client_packets($1)
- corenet_receive_soundd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_soundd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive soundd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_soundd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_soundd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_soundd_client_packets($1)
- corenet_dontaudit_receive_soundd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_soundd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to soundd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_soundd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_soundd_client_packets'($*)) dnl
-
- gen_require(`
- type soundd_client_packet_t;
- ')
-
- allow $1 soundd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_soundd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send soundd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_soundd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_soundd_server_packets'($*)) dnl
-
- gen_require(`
- type soundd_server_packet_t;
- ')
-
- allow $1 soundd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_soundd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send soundd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_soundd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_soundd_server_packets'($*)) dnl
-
- gen_require(`
- type soundd_server_packet_t;
- ')
-
- dontaudit $1 soundd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_soundd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive soundd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_soundd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_soundd_server_packets'($*)) dnl
-
- gen_require(`
- type soundd_server_packet_t;
- ')
-
- allow $1 soundd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_soundd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive soundd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_soundd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_soundd_server_packets'($*)) dnl
-
- gen_require(`
- type soundd_server_packet_t;
- ')
-
- dontaudit $1 soundd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_soundd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive soundd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_soundd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_soundd_server_packets'($*)) dnl
-
- corenet_send_soundd_server_packets($1)
- corenet_receive_soundd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_soundd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive soundd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_soundd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_soundd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_soundd_server_packets($1)
- corenet_dontaudit_receive_soundd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_soundd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to soundd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_soundd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_soundd_server_packets'($*)) dnl
-
- gen_require(`
- type soundd_server_packet_t;
- ')
-
- allow $1 soundd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_soundd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the spamd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_spamd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_spamd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_spamd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the spamd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_spamd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_spamd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_spamd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the spamd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_spamd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_spamd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_spamd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the spamd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_spamd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_spamd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_spamd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the spamd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_spamd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_spamd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_spamd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the spamd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_spamd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_spamd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_spamd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the spamd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_spamd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_spamd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_spamd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the spamd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_spamd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_spamd_port'($*)) dnl
-
- gen_require(`
- type spamd_port_t;
- ')
-
- allow $1 spamd_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_spamd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the spamd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_spamd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_spamd_port'($*)) dnl
-
- gen_require(`
- type spamd_port_t;
- ')
-
- allow $1 spamd_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_spamd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the spamd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_spamd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_spamd_port'($*)) dnl
-
- gen_require(`
- type spamd_port_t;
- ')
-
- allow $1 spamd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_spamd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send spamd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_spamd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_spamd_client_packets'($*)) dnl
-
- gen_require(`
- type spamd_client_packet_t;
- ')
-
- allow $1 spamd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_spamd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send spamd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_spamd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_spamd_client_packets'($*)) dnl
-
- gen_require(`
- type spamd_client_packet_t;
- ')
-
- dontaudit $1 spamd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_spamd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive spamd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_spamd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_spamd_client_packets'($*)) dnl
-
- gen_require(`
- type spamd_client_packet_t;
- ')
-
- allow $1 spamd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_spamd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive spamd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_spamd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_spamd_client_packets'($*)) dnl
-
- gen_require(`
- type spamd_client_packet_t;
- ')
-
- dontaudit $1 spamd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_spamd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive spamd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_spamd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_spamd_client_packets'($*)) dnl
-
- corenet_send_spamd_client_packets($1)
- corenet_receive_spamd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_spamd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive spamd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_spamd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_spamd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_spamd_client_packets($1)
- corenet_dontaudit_receive_spamd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_spamd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to spamd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_spamd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_spamd_client_packets'($*)) dnl
-
- gen_require(`
- type spamd_client_packet_t;
- ')
-
- allow $1 spamd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_spamd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send spamd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_spamd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_spamd_server_packets'($*)) dnl
-
- gen_require(`
- type spamd_server_packet_t;
- ')
-
- allow $1 spamd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_spamd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send spamd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_spamd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_spamd_server_packets'($*)) dnl
-
- gen_require(`
- type spamd_server_packet_t;
- ')
-
- dontaudit $1 spamd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_spamd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive spamd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_spamd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_spamd_server_packets'($*)) dnl
-
- gen_require(`
- type spamd_server_packet_t;
- ')
-
- allow $1 spamd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_spamd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive spamd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_spamd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_spamd_server_packets'($*)) dnl
-
- gen_require(`
- type spamd_server_packet_t;
- ')
-
- dontaudit $1 spamd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_spamd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive spamd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_spamd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_spamd_server_packets'($*)) dnl
-
- corenet_send_spamd_server_packets($1)
- corenet_receive_spamd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_spamd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive spamd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_spamd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_spamd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_spamd_server_packets($1)
- corenet_dontaudit_receive_spamd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_spamd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to spamd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_spamd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_spamd_server_packets'($*)) dnl
-
- gen_require(`
- type spamd_server_packet_t;
- ')
-
- allow $1 spamd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_spamd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the speech port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_speech_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_speech_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_speech_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the speech port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_speech_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_speech_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_speech_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the speech port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_speech_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_speech_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_speech_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the speech port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_speech_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_speech_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_speech_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the speech port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_speech_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_speech_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_speech_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the speech port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_speech_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_speech_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_speech_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the speech port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_speech_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_speech_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_speech_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the speech port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_speech_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_speech_port'($*)) dnl
-
- gen_require(`
- type speech_port_t;
- ')
-
- allow $1 speech_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_speech_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the speech port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_speech_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_speech_port'($*)) dnl
-
- gen_require(`
- type speech_port_t;
- ')
-
- allow $1 speech_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_speech_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the speech port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_speech_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_speech_port'($*)) dnl
-
- gen_require(`
- type speech_port_t;
- ')
-
- allow $1 speech_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_speech_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send speech_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_speech_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_speech_client_packets'($*)) dnl
-
- gen_require(`
- type speech_client_packet_t;
- ')
-
- allow $1 speech_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_speech_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send speech_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_speech_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_speech_client_packets'($*)) dnl
-
- gen_require(`
- type speech_client_packet_t;
- ')
-
- dontaudit $1 speech_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_speech_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive speech_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_speech_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_speech_client_packets'($*)) dnl
-
- gen_require(`
- type speech_client_packet_t;
- ')
-
- allow $1 speech_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_speech_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive speech_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_speech_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_speech_client_packets'($*)) dnl
-
- gen_require(`
- type speech_client_packet_t;
- ')
-
- dontaudit $1 speech_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_speech_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive speech_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_speech_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_speech_client_packets'($*)) dnl
-
- corenet_send_speech_client_packets($1)
- corenet_receive_speech_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_speech_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive speech_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_speech_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_speech_client_packets'($*)) dnl
-
- corenet_dontaudit_send_speech_client_packets($1)
- corenet_dontaudit_receive_speech_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_speech_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to speech_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_speech_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_speech_client_packets'($*)) dnl
-
- gen_require(`
- type speech_client_packet_t;
- ')
-
- allow $1 speech_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_speech_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send speech_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_speech_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_speech_server_packets'($*)) dnl
-
- gen_require(`
- type speech_server_packet_t;
- ')
-
- allow $1 speech_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_speech_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send speech_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_speech_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_speech_server_packets'($*)) dnl
-
- gen_require(`
- type speech_server_packet_t;
- ')
-
- dontaudit $1 speech_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_speech_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive speech_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_speech_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_speech_server_packets'($*)) dnl
-
- gen_require(`
- type speech_server_packet_t;
- ')
-
- allow $1 speech_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_speech_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive speech_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_speech_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_speech_server_packets'($*)) dnl
-
- gen_require(`
- type speech_server_packet_t;
- ')
-
- dontaudit $1 speech_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_speech_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive speech_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_speech_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_speech_server_packets'($*)) dnl
-
- corenet_send_speech_server_packets($1)
- corenet_receive_speech_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_speech_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive speech_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_speech_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_speech_server_packets'($*)) dnl
-
- corenet_dontaudit_send_speech_server_packets($1)
- corenet_dontaudit_receive_speech_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_speech_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to speech_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_speech_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_speech_server_packets'($*)) dnl
-
- gen_require(`
- type speech_server_packet_t;
- ')
-
- allow $1 speech_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_speech_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the squid port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_squid_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_squid_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_squid_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the squid port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_squid_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_squid_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_squid_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the squid port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_squid_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_squid_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_squid_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the squid port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_squid_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_squid_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_squid_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the squid port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_squid_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_squid_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_squid_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the squid port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_squid_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_squid_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_squid_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the squid port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_squid_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_squid_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_squid_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the squid port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_squid_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_squid_port'($*)) dnl
-
- gen_require(`
- type squid_port_t;
- ')
-
- allow $1 squid_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_squid_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the squid port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_squid_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_squid_port'($*)) dnl
-
- gen_require(`
- type squid_port_t;
- ')
-
- allow $1 squid_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_squid_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the squid port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_squid_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_squid_port'($*)) dnl
-
- gen_require(`
- type squid_port_t;
- ')
-
- allow $1 squid_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_squid_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send squid_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_squid_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_squid_client_packets'($*)) dnl
-
- gen_require(`
- type squid_client_packet_t;
- ')
-
- allow $1 squid_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_squid_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send squid_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_squid_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_squid_client_packets'($*)) dnl
-
- gen_require(`
- type squid_client_packet_t;
- ')
-
- dontaudit $1 squid_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_squid_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive squid_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_squid_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_squid_client_packets'($*)) dnl
-
- gen_require(`
- type squid_client_packet_t;
- ')
-
- allow $1 squid_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_squid_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive squid_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_squid_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_squid_client_packets'($*)) dnl
-
- gen_require(`
- type squid_client_packet_t;
- ')
-
- dontaudit $1 squid_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_squid_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive squid_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_squid_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_squid_client_packets'($*)) dnl
-
- corenet_send_squid_client_packets($1)
- corenet_receive_squid_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_squid_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive squid_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_squid_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_squid_client_packets'($*)) dnl
-
- corenet_dontaudit_send_squid_client_packets($1)
- corenet_dontaudit_receive_squid_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_squid_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to squid_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_squid_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_squid_client_packets'($*)) dnl
-
- gen_require(`
- type squid_client_packet_t;
- ')
-
- allow $1 squid_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_squid_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send squid_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_squid_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_squid_server_packets'($*)) dnl
-
- gen_require(`
- type squid_server_packet_t;
- ')
-
- allow $1 squid_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_squid_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send squid_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_squid_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_squid_server_packets'($*)) dnl
-
- gen_require(`
- type squid_server_packet_t;
- ')
-
- dontaudit $1 squid_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_squid_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive squid_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_squid_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_squid_server_packets'($*)) dnl
-
- gen_require(`
- type squid_server_packet_t;
- ')
-
- allow $1 squid_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_squid_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive squid_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_squid_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_squid_server_packets'($*)) dnl
-
- gen_require(`
- type squid_server_packet_t;
- ')
-
- dontaudit $1 squid_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_squid_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive squid_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_squid_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_squid_server_packets'($*)) dnl
-
- corenet_send_squid_server_packets($1)
- corenet_receive_squid_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_squid_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive squid_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_squid_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_squid_server_packets'($*)) dnl
-
- corenet_dontaudit_send_squid_server_packets($1)
- corenet_dontaudit_receive_squid_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_squid_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to squid_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_squid_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_squid_server_packets'($*)) dnl
-
- gen_require(`
- type squid_server_packet_t;
- ')
-
- allow $1 squid_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_squid_server_packets'($*)) dnl
- ')
-
-
- # snmp and htcp
-
-
-########################################
-##
-## Send and receive TCP traffic on the ssdp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_ssdp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ssdp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ssdp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the ssdp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_ssdp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ssdp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_ssdp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the ssdp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_ssdp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ssdp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ssdp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the ssdp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_ssdp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ssdp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ssdp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the ssdp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_ssdp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ssdp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ssdp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the ssdp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_ssdp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ssdp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ssdp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the ssdp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_ssdp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ssdp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ssdp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the ssdp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_ssdp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ssdp_port'($*)) dnl
-
- gen_require(`
- type ssdp_port_t;
- ')
-
- allow $1 ssdp_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ssdp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the ssdp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_ssdp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ssdp_port'($*)) dnl
-
- gen_require(`
- type ssdp_port_t;
- ')
-
- allow $1 ssdp_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ssdp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the ssdp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_ssdp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ssdp_port'($*)) dnl
-
- gen_require(`
- type ssdp_port_t;
- ')
-
- allow $1 ssdp_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ssdp_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ssdp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ssdp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ssdp_client_packets'($*)) dnl
-
- gen_require(`
- type ssdp_client_packet_t;
- ')
-
- allow $1 ssdp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ssdp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ssdp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ssdp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ssdp_client_packets'($*)) dnl
-
- gen_require(`
- type ssdp_client_packet_t;
- ')
-
- dontaudit $1 ssdp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ssdp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ssdp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ssdp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ssdp_client_packets'($*)) dnl
-
- gen_require(`
- type ssdp_client_packet_t;
- ')
-
- allow $1 ssdp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ssdp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ssdp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ssdp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ssdp_client_packets'($*)) dnl
-
- gen_require(`
- type ssdp_client_packet_t;
- ')
-
- dontaudit $1 ssdp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ssdp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ssdp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ssdp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ssdp_client_packets'($*)) dnl
-
- corenet_send_ssdp_client_packets($1)
- corenet_receive_ssdp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ssdp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ssdp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ssdp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ssdp_client_packets'($*)) dnl
-
- corenet_dontaudit_send_ssdp_client_packets($1)
- corenet_dontaudit_receive_ssdp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ssdp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ssdp_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ssdp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ssdp_client_packets'($*)) dnl
-
- gen_require(`
- type ssdp_client_packet_t;
- ')
-
- allow $1 ssdp_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ssdp_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ssdp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ssdp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ssdp_server_packets'($*)) dnl
-
- gen_require(`
- type ssdp_server_packet_t;
- ')
-
- allow $1 ssdp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ssdp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ssdp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ssdp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ssdp_server_packets'($*)) dnl
-
- gen_require(`
- type ssdp_server_packet_t;
- ')
-
- dontaudit $1 ssdp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ssdp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ssdp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ssdp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ssdp_server_packets'($*)) dnl
-
- gen_require(`
- type ssdp_server_packet_t;
- ')
-
- allow $1 ssdp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ssdp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ssdp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ssdp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ssdp_server_packets'($*)) dnl
-
- gen_require(`
- type ssdp_server_packet_t;
- ')
-
- dontaudit $1 ssdp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ssdp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ssdp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ssdp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ssdp_server_packets'($*)) dnl
-
- corenet_send_ssdp_server_packets($1)
- corenet_receive_ssdp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ssdp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ssdp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ssdp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ssdp_server_packets'($*)) dnl
-
- corenet_dontaudit_send_ssdp_server_packets($1)
- corenet_dontaudit_receive_ssdp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ssdp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ssdp_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ssdp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ssdp_server_packets'($*)) dnl
-
- gen_require(`
- type ssdp_server_packet_t;
- ')
-
- allow $1 ssdp_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ssdp_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the ssh port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_ssh_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ssh_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ssh_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the ssh port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_ssh_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ssh_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_ssh_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the ssh port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_ssh_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ssh_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ssh_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the ssh port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_ssh_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ssh_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ssh_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the ssh port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_ssh_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ssh_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ssh_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the ssh port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_ssh_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ssh_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ssh_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the ssh port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_ssh_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ssh_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ssh_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the ssh port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_ssh_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ssh_port'($*)) dnl
-
- gen_require(`
- type ssh_port_t;
- ')
-
- allow $1 ssh_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ssh_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the ssh port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_ssh_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ssh_port'($*)) dnl
-
- gen_require(`
- type ssh_port_t;
- ')
-
- allow $1 ssh_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ssh_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the ssh port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_ssh_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ssh_port'($*)) dnl
-
- gen_require(`
- type ssh_port_t;
- ')
-
- allow $1 ssh_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ssh_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ssh_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ssh_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ssh_client_packets'($*)) dnl
-
- gen_require(`
- type ssh_client_packet_t;
- ')
-
- allow $1 ssh_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ssh_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ssh_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ssh_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ssh_client_packets'($*)) dnl
-
- gen_require(`
- type ssh_client_packet_t;
- ')
-
- dontaudit $1 ssh_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ssh_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ssh_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ssh_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ssh_client_packets'($*)) dnl
-
- gen_require(`
- type ssh_client_packet_t;
- ')
-
- allow $1 ssh_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ssh_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ssh_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ssh_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ssh_client_packets'($*)) dnl
-
- gen_require(`
- type ssh_client_packet_t;
- ')
-
- dontaudit $1 ssh_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ssh_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ssh_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ssh_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ssh_client_packets'($*)) dnl
-
- corenet_send_ssh_client_packets($1)
- corenet_receive_ssh_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ssh_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ssh_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ssh_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ssh_client_packets'($*)) dnl
-
- corenet_dontaudit_send_ssh_client_packets($1)
- corenet_dontaudit_receive_ssh_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ssh_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ssh_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ssh_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ssh_client_packets'($*)) dnl
-
- gen_require(`
- type ssh_client_packet_t;
- ')
-
- allow $1 ssh_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ssh_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ssh_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ssh_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ssh_server_packets'($*)) dnl
-
- gen_require(`
- type ssh_server_packet_t;
- ')
-
- allow $1 ssh_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ssh_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ssh_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ssh_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ssh_server_packets'($*)) dnl
-
- gen_require(`
- type ssh_server_packet_t;
- ')
-
- dontaudit $1 ssh_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ssh_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ssh_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ssh_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ssh_server_packets'($*)) dnl
-
- gen_require(`
- type ssh_server_packet_t;
- ')
-
- allow $1 ssh_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ssh_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ssh_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ssh_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ssh_server_packets'($*)) dnl
-
- gen_require(`
- type ssh_server_packet_t;
- ')
-
- dontaudit $1 ssh_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ssh_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ssh_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ssh_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ssh_server_packets'($*)) dnl
-
- corenet_send_ssh_server_packets($1)
- corenet_receive_ssh_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ssh_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ssh_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ssh_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ssh_server_packets'($*)) dnl
-
- corenet_dontaudit_send_ssh_server_packets($1)
- corenet_dontaudit_receive_ssh_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ssh_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ssh_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ssh_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ssh_server_packets'($*)) dnl
-
- gen_require(`
- type ssh_server_packet_t;
- ')
-
- allow $1 ssh_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ssh_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the stunnel port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_stunnel_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_stunnel_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_stunnel_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the stunnel port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_stunnel_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_stunnel_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_stunnel_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the stunnel port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_stunnel_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_stunnel_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_stunnel_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the stunnel port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_stunnel_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_stunnel_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_stunnel_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the stunnel port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_stunnel_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_stunnel_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_stunnel_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the stunnel port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_stunnel_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_stunnel_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_stunnel_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the stunnel port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_stunnel_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_stunnel_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_stunnel_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the stunnel port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_stunnel_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_stunnel_port'($*)) dnl
-
- gen_require(`
- type stunnel_port_t;
- ')
-
- allow $1 stunnel_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_stunnel_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the stunnel port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_stunnel_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_stunnel_port'($*)) dnl
-
- gen_require(`
- type stunnel_port_t;
- ')
-
- allow $1 stunnel_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_stunnel_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the stunnel port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_stunnel_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_stunnel_port'($*)) dnl
-
- gen_require(`
- type stunnel_port_t;
- ')
-
- allow $1 stunnel_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_stunnel_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send stunnel_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_stunnel_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_stunnel_client_packets'($*)) dnl
-
- gen_require(`
- type stunnel_client_packet_t;
- ')
-
- allow $1 stunnel_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_stunnel_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send stunnel_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_stunnel_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_stunnel_client_packets'($*)) dnl
-
- gen_require(`
- type stunnel_client_packet_t;
- ')
-
- dontaudit $1 stunnel_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_stunnel_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive stunnel_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_stunnel_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_stunnel_client_packets'($*)) dnl
-
- gen_require(`
- type stunnel_client_packet_t;
- ')
-
- allow $1 stunnel_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_stunnel_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive stunnel_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_stunnel_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_stunnel_client_packets'($*)) dnl
-
- gen_require(`
- type stunnel_client_packet_t;
- ')
-
- dontaudit $1 stunnel_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_stunnel_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive stunnel_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_stunnel_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_stunnel_client_packets'($*)) dnl
-
- corenet_send_stunnel_client_packets($1)
- corenet_receive_stunnel_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_stunnel_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive stunnel_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_stunnel_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_stunnel_client_packets'($*)) dnl
-
- corenet_dontaudit_send_stunnel_client_packets($1)
- corenet_dontaudit_receive_stunnel_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_stunnel_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to stunnel_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_stunnel_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_stunnel_client_packets'($*)) dnl
-
- gen_require(`
- type stunnel_client_packet_t;
- ')
-
- allow $1 stunnel_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_stunnel_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send stunnel_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_stunnel_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_stunnel_server_packets'($*)) dnl
-
- gen_require(`
- type stunnel_server_packet_t;
- ')
-
- allow $1 stunnel_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_stunnel_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send stunnel_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_stunnel_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_stunnel_server_packets'($*)) dnl
-
- gen_require(`
- type stunnel_server_packet_t;
- ')
-
- dontaudit $1 stunnel_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_stunnel_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive stunnel_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_stunnel_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_stunnel_server_packets'($*)) dnl
-
- gen_require(`
- type stunnel_server_packet_t;
- ')
-
- allow $1 stunnel_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_stunnel_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive stunnel_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_stunnel_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_stunnel_server_packets'($*)) dnl
-
- gen_require(`
- type stunnel_server_packet_t;
- ')
-
- dontaudit $1 stunnel_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_stunnel_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive stunnel_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_stunnel_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_stunnel_server_packets'($*)) dnl
-
- corenet_send_stunnel_server_packets($1)
- corenet_receive_stunnel_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_stunnel_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive stunnel_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_stunnel_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_stunnel_server_packets'($*)) dnl
-
- corenet_dontaudit_send_stunnel_server_packets($1)
- corenet_dontaudit_receive_stunnel_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_stunnel_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to stunnel_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_stunnel_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_stunnel_server_packets'($*)) dnl
-
- gen_require(`
- type stunnel_server_packet_t;
- ')
-
- allow $1 stunnel_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_stunnel_server_packets'($*)) dnl
- ')
-
-
- # no defined portcon
-
-
-########################################
-##
-## Send and receive TCP traffic on the svn port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_svn_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_svn_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_svn_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the svn port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_svn_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_svn_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_svn_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the svn port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_svn_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_svn_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_svn_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the svn port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_svn_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_svn_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_svn_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the svn port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_svn_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_svn_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_svn_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the svn port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_svn_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_svn_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_svn_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the svn port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_svn_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_svn_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_svn_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the svn port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_svn_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_svn_port'($*)) dnl
-
- gen_require(`
- type svn_port_t;
- ')
-
- allow $1 svn_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_svn_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the svn port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_svn_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_svn_port'($*)) dnl
-
- gen_require(`
- type svn_port_t;
- ')
-
- allow $1 svn_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_svn_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the svn port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_svn_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_svn_port'($*)) dnl
-
- gen_require(`
- type svn_port_t;
- ')
-
- allow $1 svn_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_svn_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send svn_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_svn_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_svn_client_packets'($*)) dnl
-
- gen_require(`
- type svn_client_packet_t;
- ')
-
- allow $1 svn_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_svn_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send svn_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_svn_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_svn_client_packets'($*)) dnl
-
- gen_require(`
- type svn_client_packet_t;
- ')
-
- dontaudit $1 svn_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_svn_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive svn_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_svn_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_svn_client_packets'($*)) dnl
-
- gen_require(`
- type svn_client_packet_t;
- ')
-
- allow $1 svn_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_svn_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive svn_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_svn_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_svn_client_packets'($*)) dnl
-
- gen_require(`
- type svn_client_packet_t;
- ')
-
- dontaudit $1 svn_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_svn_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive svn_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_svn_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_svn_client_packets'($*)) dnl
-
- corenet_send_svn_client_packets($1)
- corenet_receive_svn_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_svn_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive svn_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_svn_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_svn_client_packets'($*)) dnl
-
- corenet_dontaudit_send_svn_client_packets($1)
- corenet_dontaudit_receive_svn_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_svn_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to svn_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_svn_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_svn_client_packets'($*)) dnl
-
- gen_require(`
- type svn_client_packet_t;
- ')
-
- allow $1 svn_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_svn_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send svn_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_svn_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_svn_server_packets'($*)) dnl
-
- gen_require(`
- type svn_server_packet_t;
- ')
-
- allow $1 svn_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_svn_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send svn_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_svn_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_svn_server_packets'($*)) dnl
-
- gen_require(`
- type svn_server_packet_t;
- ')
-
- dontaudit $1 svn_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_svn_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive svn_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_svn_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_svn_server_packets'($*)) dnl
-
- gen_require(`
- type svn_server_packet_t;
- ')
-
- allow $1 svn_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_svn_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive svn_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_svn_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_svn_server_packets'($*)) dnl
-
- gen_require(`
- type svn_server_packet_t;
- ')
-
- dontaudit $1 svn_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_svn_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive svn_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_svn_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_svn_server_packets'($*)) dnl
-
- corenet_send_svn_server_packets($1)
- corenet_receive_svn_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_svn_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive svn_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_svn_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_svn_server_packets'($*)) dnl
-
- corenet_dontaudit_send_svn_server_packets($1)
- corenet_dontaudit_receive_svn_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_svn_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to svn_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_svn_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_svn_server_packets'($*)) dnl
-
- gen_require(`
- type svn_server_packet_t;
- ')
-
- allow $1 svn_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_svn_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the svrloc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_svrloc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_svrloc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_svrloc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the svrloc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_svrloc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_svrloc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_svrloc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the svrloc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_svrloc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_svrloc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_svrloc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the svrloc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_svrloc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_svrloc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_svrloc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the svrloc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_svrloc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_svrloc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_svrloc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the svrloc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_svrloc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_svrloc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_svrloc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the svrloc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_svrloc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_svrloc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_svrloc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the svrloc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_svrloc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_svrloc_port'($*)) dnl
-
- gen_require(`
- type svrloc_port_t;
- ')
-
- allow $1 svrloc_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_svrloc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the svrloc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_svrloc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_svrloc_port'($*)) dnl
-
- gen_require(`
- type svrloc_port_t;
- ')
-
- allow $1 svrloc_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_svrloc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the svrloc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_svrloc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_svrloc_port'($*)) dnl
-
- gen_require(`
- type svrloc_port_t;
- ')
-
- allow $1 svrloc_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_svrloc_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send svrloc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_svrloc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_svrloc_client_packets'($*)) dnl
-
- gen_require(`
- type svrloc_client_packet_t;
- ')
-
- allow $1 svrloc_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_svrloc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send svrloc_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_svrloc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_svrloc_client_packets'($*)) dnl
-
- gen_require(`
- type svrloc_client_packet_t;
- ')
-
- dontaudit $1 svrloc_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_svrloc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive svrloc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_svrloc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_svrloc_client_packets'($*)) dnl
-
- gen_require(`
- type svrloc_client_packet_t;
- ')
-
- allow $1 svrloc_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_svrloc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive svrloc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_svrloc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_svrloc_client_packets'($*)) dnl
-
- gen_require(`
- type svrloc_client_packet_t;
- ')
-
- dontaudit $1 svrloc_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_svrloc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive svrloc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_svrloc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_svrloc_client_packets'($*)) dnl
-
- corenet_send_svrloc_client_packets($1)
- corenet_receive_svrloc_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_svrloc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive svrloc_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_svrloc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_svrloc_client_packets'($*)) dnl
-
- corenet_dontaudit_send_svrloc_client_packets($1)
- corenet_dontaudit_receive_svrloc_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_svrloc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to svrloc_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_svrloc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_svrloc_client_packets'($*)) dnl
-
- gen_require(`
- type svrloc_client_packet_t;
- ')
-
- allow $1 svrloc_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_svrloc_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send svrloc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_svrloc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_svrloc_server_packets'($*)) dnl
-
- gen_require(`
- type svrloc_server_packet_t;
- ')
-
- allow $1 svrloc_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_svrloc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send svrloc_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_svrloc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_svrloc_server_packets'($*)) dnl
-
- gen_require(`
- type svrloc_server_packet_t;
- ')
-
- dontaudit $1 svrloc_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_svrloc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive svrloc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_svrloc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_svrloc_server_packets'($*)) dnl
-
- gen_require(`
- type svrloc_server_packet_t;
- ')
-
- allow $1 svrloc_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_svrloc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive svrloc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_svrloc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_svrloc_server_packets'($*)) dnl
-
- gen_require(`
- type svrloc_server_packet_t;
- ')
-
- dontaudit $1 svrloc_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_svrloc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive svrloc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_svrloc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_svrloc_server_packets'($*)) dnl
-
- corenet_send_svrloc_server_packets($1)
- corenet_receive_svrloc_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_svrloc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive svrloc_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_svrloc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_svrloc_server_packets'($*)) dnl
-
- corenet_dontaudit_send_svrloc_server_packets($1)
- corenet_dontaudit_receive_svrloc_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_svrloc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to svrloc_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_svrloc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_svrloc_server_packets'($*)) dnl
-
- gen_require(`
- type svrloc_server_packet_t;
- ')
-
- allow $1 svrloc_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_svrloc_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the swat port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_swat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_swat_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_swat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the swat port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_swat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_swat_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_swat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the swat port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_swat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_swat_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_swat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the swat port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_swat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_swat_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_swat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the swat port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_swat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_swat_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_swat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the swat port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_swat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_swat_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_swat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the swat port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_swat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_swat_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_swat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the swat port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_swat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_swat_port'($*)) dnl
-
- gen_require(`
- type swat_port_t;
- ')
-
- allow $1 swat_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_swat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the swat port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_swat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_swat_port'($*)) dnl
-
- gen_require(`
- type swat_port_t;
- ')
-
- allow $1 swat_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_swat_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the swat port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_swat_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_swat_port'($*)) dnl
-
- gen_require(`
- type swat_port_t;
- ')
-
- allow $1 swat_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_swat_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send swat_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_swat_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_swat_client_packets'($*)) dnl
-
- gen_require(`
- type swat_client_packet_t;
- ')
-
- allow $1 swat_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_swat_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send swat_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_swat_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_swat_client_packets'($*)) dnl
-
- gen_require(`
- type swat_client_packet_t;
- ')
-
- dontaudit $1 swat_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_swat_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive swat_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_swat_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_swat_client_packets'($*)) dnl
-
- gen_require(`
- type swat_client_packet_t;
- ')
-
- allow $1 swat_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_swat_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive swat_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_swat_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_swat_client_packets'($*)) dnl
-
- gen_require(`
- type swat_client_packet_t;
- ')
-
- dontaudit $1 swat_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_swat_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive swat_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_swat_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_swat_client_packets'($*)) dnl
-
- corenet_send_swat_client_packets($1)
- corenet_receive_swat_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_swat_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive swat_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_swat_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_swat_client_packets'($*)) dnl
-
- corenet_dontaudit_send_swat_client_packets($1)
- corenet_dontaudit_receive_swat_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_swat_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to swat_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_swat_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_swat_client_packets'($*)) dnl
-
- gen_require(`
- type swat_client_packet_t;
- ')
-
- allow $1 swat_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_swat_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send swat_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_swat_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_swat_server_packets'($*)) dnl
-
- gen_require(`
- type swat_server_packet_t;
- ')
-
- allow $1 swat_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_swat_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send swat_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_swat_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_swat_server_packets'($*)) dnl
-
- gen_require(`
- type swat_server_packet_t;
- ')
-
- dontaudit $1 swat_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_swat_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive swat_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_swat_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_swat_server_packets'($*)) dnl
-
- gen_require(`
- type swat_server_packet_t;
- ')
-
- allow $1 swat_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_swat_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive swat_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_swat_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_swat_server_packets'($*)) dnl
-
- gen_require(`
- type swat_server_packet_t;
- ')
-
- dontaudit $1 swat_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_swat_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive swat_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_swat_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_swat_server_packets'($*)) dnl
-
- corenet_send_swat_server_packets($1)
- corenet_receive_swat_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_swat_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive swat_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_swat_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_swat_server_packets'($*)) dnl
-
- corenet_dontaudit_send_swat_server_packets($1)
- corenet_dontaudit_receive_swat_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_swat_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to swat_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_swat_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_swat_server_packets'($*)) dnl
-
- gen_require(`
- type swat_server_packet_t;
- ')
-
- allow $1 swat_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_swat_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the syncthing port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_syncthing_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_syncthing_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_syncthing_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the syncthing port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_syncthing_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_syncthing_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_syncthing_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the syncthing port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_syncthing_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_syncthing_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_syncthing_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the syncthing port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_syncthing_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_syncthing_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_syncthing_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the syncthing port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_syncthing_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_syncthing_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_syncthing_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the syncthing port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_syncthing_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_syncthing_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_syncthing_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the syncthing port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_syncthing_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_syncthing_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_syncthing_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the syncthing port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_syncthing_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_syncthing_port'($*)) dnl
-
- gen_require(`
- type syncthing_port_t;
- ')
-
- allow $1 syncthing_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_syncthing_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the syncthing port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_syncthing_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_syncthing_port'($*)) dnl
-
- gen_require(`
- type syncthing_port_t;
- ')
-
- allow $1 syncthing_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_syncthing_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the syncthing port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_syncthing_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_syncthing_port'($*)) dnl
-
- gen_require(`
- type syncthing_port_t;
- ')
-
- allow $1 syncthing_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_syncthing_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send syncthing_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_syncthing_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_syncthing_client_packets'($*)) dnl
-
- gen_require(`
- type syncthing_client_packet_t;
- ')
-
- allow $1 syncthing_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_syncthing_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send syncthing_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_syncthing_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_syncthing_client_packets'($*)) dnl
-
- gen_require(`
- type syncthing_client_packet_t;
- ')
-
- dontaudit $1 syncthing_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_syncthing_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive syncthing_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_syncthing_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_syncthing_client_packets'($*)) dnl
-
- gen_require(`
- type syncthing_client_packet_t;
- ')
-
- allow $1 syncthing_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_syncthing_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive syncthing_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_syncthing_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_syncthing_client_packets'($*)) dnl
-
- gen_require(`
- type syncthing_client_packet_t;
- ')
-
- dontaudit $1 syncthing_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_syncthing_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive syncthing_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_syncthing_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_syncthing_client_packets'($*)) dnl
-
- corenet_send_syncthing_client_packets($1)
- corenet_receive_syncthing_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_syncthing_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive syncthing_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_syncthing_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_syncthing_client_packets'($*)) dnl
-
- corenet_dontaudit_send_syncthing_client_packets($1)
- corenet_dontaudit_receive_syncthing_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_syncthing_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to syncthing_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_syncthing_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_syncthing_client_packets'($*)) dnl
-
- gen_require(`
- type syncthing_client_packet_t;
- ')
-
- allow $1 syncthing_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_syncthing_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send syncthing_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_syncthing_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_syncthing_server_packets'($*)) dnl
-
- gen_require(`
- type syncthing_server_packet_t;
- ')
-
- allow $1 syncthing_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_syncthing_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send syncthing_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_syncthing_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_syncthing_server_packets'($*)) dnl
-
- gen_require(`
- type syncthing_server_packet_t;
- ')
-
- dontaudit $1 syncthing_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_syncthing_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive syncthing_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_syncthing_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_syncthing_server_packets'($*)) dnl
-
- gen_require(`
- type syncthing_server_packet_t;
- ')
-
- allow $1 syncthing_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_syncthing_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive syncthing_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_syncthing_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_syncthing_server_packets'($*)) dnl
-
- gen_require(`
- type syncthing_server_packet_t;
- ')
-
- dontaudit $1 syncthing_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_syncthing_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive syncthing_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_syncthing_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_syncthing_server_packets'($*)) dnl
-
- corenet_send_syncthing_server_packets($1)
- corenet_receive_syncthing_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_syncthing_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive syncthing_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_syncthing_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_syncthing_server_packets'($*)) dnl
-
- corenet_dontaudit_send_syncthing_server_packets($1)
- corenet_dontaudit_receive_syncthing_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_syncthing_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to syncthing_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_syncthing_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_syncthing_server_packets'($*)) dnl
-
- gen_require(`
- type syncthing_server_packet_t;
- ')
-
- allow $1 syncthing_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_syncthing_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the syncthing_admin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_syncthing_admin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_syncthing_admin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_syncthing_admin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the syncthing_admin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_syncthing_admin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_syncthing_admin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_syncthing_admin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the syncthing_admin port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_syncthing_admin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_syncthing_admin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_syncthing_admin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the syncthing_admin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_syncthing_admin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_syncthing_admin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_syncthing_admin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the syncthing_admin port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_syncthing_admin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_syncthing_admin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_syncthing_admin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the syncthing_admin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_syncthing_admin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_syncthing_admin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_syncthing_admin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the syncthing_admin port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_syncthing_admin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_syncthing_admin_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_syncthing_admin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the syncthing_admin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_syncthing_admin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_syncthing_admin_port'($*)) dnl
-
- gen_require(`
- type syncthing_admin_port_t;
- ')
-
- allow $1 syncthing_admin_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_syncthing_admin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the syncthing_admin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_syncthing_admin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_syncthing_admin_port'($*)) dnl
-
- gen_require(`
- type syncthing_admin_port_t;
- ')
-
- allow $1 syncthing_admin_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_syncthing_admin_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the syncthing_admin port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_syncthing_admin_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_syncthing_admin_port'($*)) dnl
-
- gen_require(`
- type syncthing_admin_port_t;
- ')
-
- allow $1 syncthing_admin_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_syncthing_admin_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send syncthing_admin_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_syncthing_admin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_syncthing_admin_client_packets'($*)) dnl
-
- gen_require(`
- type syncthing_admin_client_packet_t;
- ')
-
- allow $1 syncthing_admin_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_syncthing_admin_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send syncthing_admin_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_syncthing_admin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_syncthing_admin_client_packets'($*)) dnl
-
- gen_require(`
- type syncthing_admin_client_packet_t;
- ')
-
- dontaudit $1 syncthing_admin_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_syncthing_admin_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive syncthing_admin_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_syncthing_admin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_syncthing_admin_client_packets'($*)) dnl
-
- gen_require(`
- type syncthing_admin_client_packet_t;
- ')
-
- allow $1 syncthing_admin_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_syncthing_admin_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive syncthing_admin_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_syncthing_admin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_syncthing_admin_client_packets'($*)) dnl
-
- gen_require(`
- type syncthing_admin_client_packet_t;
- ')
-
- dontaudit $1 syncthing_admin_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_syncthing_admin_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive syncthing_admin_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_syncthing_admin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_syncthing_admin_client_packets'($*)) dnl
-
- corenet_send_syncthing_admin_client_packets($1)
- corenet_receive_syncthing_admin_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_syncthing_admin_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive syncthing_admin_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_syncthing_admin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_syncthing_admin_client_packets'($*)) dnl
-
- corenet_dontaudit_send_syncthing_admin_client_packets($1)
- corenet_dontaudit_receive_syncthing_admin_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_syncthing_admin_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to syncthing_admin_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_syncthing_admin_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_syncthing_admin_client_packets'($*)) dnl
-
- gen_require(`
- type syncthing_admin_client_packet_t;
- ')
-
- allow $1 syncthing_admin_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_syncthing_admin_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send syncthing_admin_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_syncthing_admin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_syncthing_admin_server_packets'($*)) dnl
-
- gen_require(`
- type syncthing_admin_server_packet_t;
- ')
-
- allow $1 syncthing_admin_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_syncthing_admin_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send syncthing_admin_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_syncthing_admin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_syncthing_admin_server_packets'($*)) dnl
-
- gen_require(`
- type syncthing_admin_server_packet_t;
- ')
-
- dontaudit $1 syncthing_admin_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_syncthing_admin_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive syncthing_admin_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_syncthing_admin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_syncthing_admin_server_packets'($*)) dnl
-
- gen_require(`
- type syncthing_admin_server_packet_t;
- ')
-
- allow $1 syncthing_admin_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_syncthing_admin_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive syncthing_admin_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_syncthing_admin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_syncthing_admin_server_packets'($*)) dnl
-
- gen_require(`
- type syncthing_admin_server_packet_t;
- ')
-
- dontaudit $1 syncthing_admin_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_syncthing_admin_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive syncthing_admin_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_syncthing_admin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_syncthing_admin_server_packets'($*)) dnl
-
- corenet_send_syncthing_admin_server_packets($1)
- corenet_receive_syncthing_admin_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_syncthing_admin_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive syncthing_admin_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_syncthing_admin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_syncthing_admin_server_packets'($*)) dnl
-
- corenet_dontaudit_send_syncthing_admin_server_packets($1)
- corenet_dontaudit_receive_syncthing_admin_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_syncthing_admin_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to syncthing_admin_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_syncthing_admin_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_syncthing_admin_server_packets'($*)) dnl
-
- gen_require(`
- type syncthing_admin_server_packet_t;
- ')
-
- allow $1 syncthing_admin_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_syncthing_admin_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the syncthing_discovery port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_syncthing_discovery_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_syncthing_discovery_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_syncthing_discovery_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the syncthing_discovery port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_syncthing_discovery_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_syncthing_discovery_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_syncthing_discovery_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the syncthing_discovery port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_syncthing_discovery_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_syncthing_discovery_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_syncthing_discovery_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the syncthing_discovery port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_syncthing_discovery_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_syncthing_discovery_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_syncthing_discovery_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the syncthing_discovery port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_syncthing_discovery_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_syncthing_discovery_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_syncthing_discovery_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the syncthing_discovery port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_syncthing_discovery_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_syncthing_discovery_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_syncthing_discovery_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the syncthing_discovery port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_syncthing_discovery_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_syncthing_discovery_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_syncthing_discovery_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the syncthing_discovery port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_syncthing_discovery_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_syncthing_discovery_port'($*)) dnl
-
- gen_require(`
- type syncthing_discovery_port_t;
- ')
-
- allow $1 syncthing_discovery_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_syncthing_discovery_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the syncthing_discovery port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_syncthing_discovery_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_syncthing_discovery_port'($*)) dnl
-
- gen_require(`
- type syncthing_discovery_port_t;
- ')
-
- allow $1 syncthing_discovery_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_syncthing_discovery_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the syncthing_discovery port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_syncthing_discovery_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_syncthing_discovery_port'($*)) dnl
-
- gen_require(`
- type syncthing_discovery_port_t;
- ')
-
- allow $1 syncthing_discovery_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_syncthing_discovery_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send syncthing_discovery_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_syncthing_discovery_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_syncthing_discovery_client_packets'($*)) dnl
-
- gen_require(`
- type syncthing_discovery_client_packet_t;
- ')
-
- allow $1 syncthing_discovery_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_syncthing_discovery_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send syncthing_discovery_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_syncthing_discovery_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_syncthing_discovery_client_packets'($*)) dnl
-
- gen_require(`
- type syncthing_discovery_client_packet_t;
- ')
-
- dontaudit $1 syncthing_discovery_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_syncthing_discovery_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive syncthing_discovery_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_syncthing_discovery_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_syncthing_discovery_client_packets'($*)) dnl
-
- gen_require(`
- type syncthing_discovery_client_packet_t;
- ')
-
- allow $1 syncthing_discovery_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_syncthing_discovery_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive syncthing_discovery_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_syncthing_discovery_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_syncthing_discovery_client_packets'($*)) dnl
-
- gen_require(`
- type syncthing_discovery_client_packet_t;
- ')
-
- dontaudit $1 syncthing_discovery_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_syncthing_discovery_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive syncthing_discovery_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_syncthing_discovery_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_syncthing_discovery_client_packets'($*)) dnl
-
- corenet_send_syncthing_discovery_client_packets($1)
- corenet_receive_syncthing_discovery_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_syncthing_discovery_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive syncthing_discovery_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_syncthing_discovery_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_syncthing_discovery_client_packets'($*)) dnl
-
- corenet_dontaudit_send_syncthing_discovery_client_packets($1)
- corenet_dontaudit_receive_syncthing_discovery_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_syncthing_discovery_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to syncthing_discovery_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_syncthing_discovery_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_syncthing_discovery_client_packets'($*)) dnl
-
- gen_require(`
- type syncthing_discovery_client_packet_t;
- ')
-
- allow $1 syncthing_discovery_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_syncthing_discovery_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send syncthing_discovery_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_syncthing_discovery_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_syncthing_discovery_server_packets'($*)) dnl
-
- gen_require(`
- type syncthing_discovery_server_packet_t;
- ')
-
- allow $1 syncthing_discovery_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_syncthing_discovery_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send syncthing_discovery_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_syncthing_discovery_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_syncthing_discovery_server_packets'($*)) dnl
-
- gen_require(`
- type syncthing_discovery_server_packet_t;
- ')
-
- dontaudit $1 syncthing_discovery_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_syncthing_discovery_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive syncthing_discovery_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_syncthing_discovery_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_syncthing_discovery_server_packets'($*)) dnl
-
- gen_require(`
- type syncthing_discovery_server_packet_t;
- ')
-
- allow $1 syncthing_discovery_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_syncthing_discovery_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive syncthing_discovery_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_syncthing_discovery_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_syncthing_discovery_server_packets'($*)) dnl
-
- gen_require(`
- type syncthing_discovery_server_packet_t;
- ')
-
- dontaudit $1 syncthing_discovery_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_syncthing_discovery_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive syncthing_discovery_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_syncthing_discovery_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_syncthing_discovery_server_packets'($*)) dnl
-
- corenet_send_syncthing_discovery_server_packets($1)
- corenet_receive_syncthing_discovery_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_syncthing_discovery_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive syncthing_discovery_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_syncthing_discovery_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_syncthing_discovery_server_packets'($*)) dnl
-
- corenet_dontaudit_send_syncthing_discovery_server_packets($1)
- corenet_dontaudit_receive_syncthing_discovery_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_syncthing_discovery_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to syncthing_discovery_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_syncthing_discovery_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_syncthing_discovery_server_packets'($*)) dnl
-
- gen_require(`
- type syncthing_discovery_server_packet_t;
- ')
-
- allow $1 syncthing_discovery_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_syncthing_discovery_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the sype_transport port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_sype_transport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_sype_transport_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_sype_transport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the sype_transport port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_sype_transport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_sype_transport_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_sype_transport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the sype_transport port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_sype_transport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_sype_transport_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_sype_transport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the sype_transport port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_sype_transport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_sype_transport_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_sype_transport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the sype_transport port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_sype_transport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_sype_transport_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_sype_transport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the sype_transport port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_sype_transport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_sype_transport_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_sype_transport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the sype_transport port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_sype_transport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_sype_transport_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_sype_transport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the sype_transport port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_sype_transport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_sype_transport_port'($*)) dnl
-
- gen_require(`
- type sype_transport_port_t;
- ')
-
- allow $1 sype_transport_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_sype_transport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the sype_transport port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_sype_transport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_sype_transport_port'($*)) dnl
-
- gen_require(`
- type sype_transport_port_t;
- ')
-
- allow $1 sype_transport_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_sype_transport_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the sype_transport port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_sype_transport_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_sype_transport_port'($*)) dnl
-
- gen_require(`
- type sype_transport_port_t;
- ')
-
- allow $1 sype_transport_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_sype_transport_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send sype_transport_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_sype_transport_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_sype_transport_client_packets'($*)) dnl
-
- gen_require(`
- type sype_transport_client_packet_t;
- ')
-
- allow $1 sype_transport_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_sype_transport_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send sype_transport_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_sype_transport_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_sype_transport_client_packets'($*)) dnl
-
- gen_require(`
- type sype_transport_client_packet_t;
- ')
-
- dontaudit $1 sype_transport_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_sype_transport_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive sype_transport_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_sype_transport_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_sype_transport_client_packets'($*)) dnl
-
- gen_require(`
- type sype_transport_client_packet_t;
- ')
-
- allow $1 sype_transport_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_sype_transport_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive sype_transport_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_sype_transport_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_sype_transport_client_packets'($*)) dnl
-
- gen_require(`
- type sype_transport_client_packet_t;
- ')
-
- dontaudit $1 sype_transport_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_sype_transport_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive sype_transport_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_sype_transport_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_sype_transport_client_packets'($*)) dnl
-
- corenet_send_sype_transport_client_packets($1)
- corenet_receive_sype_transport_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_sype_transport_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive sype_transport_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_sype_transport_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_sype_transport_client_packets'($*)) dnl
-
- corenet_dontaudit_send_sype_transport_client_packets($1)
- corenet_dontaudit_receive_sype_transport_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_sype_transport_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to sype_transport_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_sype_transport_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_sype_transport_client_packets'($*)) dnl
-
- gen_require(`
- type sype_transport_client_packet_t;
- ')
-
- allow $1 sype_transport_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_sype_transport_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send sype_transport_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_sype_transport_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_sype_transport_server_packets'($*)) dnl
-
- gen_require(`
- type sype_transport_server_packet_t;
- ')
-
- allow $1 sype_transport_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_sype_transport_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send sype_transport_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_sype_transport_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_sype_transport_server_packets'($*)) dnl
-
- gen_require(`
- type sype_transport_server_packet_t;
- ')
-
- dontaudit $1 sype_transport_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_sype_transport_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive sype_transport_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_sype_transport_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_sype_transport_server_packets'($*)) dnl
-
- gen_require(`
- type sype_transport_server_packet_t;
- ')
-
- allow $1 sype_transport_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_sype_transport_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive sype_transport_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_sype_transport_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_sype_transport_server_packets'($*)) dnl
-
- gen_require(`
- type sype_transport_server_packet_t;
- ')
-
- dontaudit $1 sype_transport_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_sype_transport_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive sype_transport_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_sype_transport_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_sype_transport_server_packets'($*)) dnl
-
- corenet_send_sype_transport_server_packets($1)
- corenet_receive_sype_transport_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_sype_transport_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive sype_transport_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_sype_transport_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_sype_transport_server_packets'($*)) dnl
-
- corenet_dontaudit_send_sype_transport_server_packets($1)
- corenet_dontaudit_receive_sype_transport_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_sype_transport_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to sype_transport_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_sype_transport_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_sype_transport_server_packets'($*)) dnl
-
- gen_require(`
- type sype_transport_server_packet_t;
- ')
-
- allow $1 sype_transport_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_sype_transport_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the syslogd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_syslogd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_syslogd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_syslogd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the syslogd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_syslogd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_syslogd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_syslogd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the syslogd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_syslogd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_syslogd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_syslogd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the syslogd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_syslogd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_syslogd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_syslogd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the syslogd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_syslogd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_syslogd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_syslogd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the syslogd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_syslogd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_syslogd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_syslogd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the syslogd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_syslogd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_syslogd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_syslogd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the syslogd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_syslogd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_syslogd_port'($*)) dnl
-
- gen_require(`
- type syslogd_port_t;
- ')
-
- allow $1 syslogd_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_syslogd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the syslogd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_syslogd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_syslogd_port'($*)) dnl
-
- gen_require(`
- type syslogd_port_t;
- ')
-
- allow $1 syslogd_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_syslogd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the syslogd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_syslogd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_syslogd_port'($*)) dnl
-
- gen_require(`
- type syslogd_port_t;
- ')
-
- allow $1 syslogd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_syslogd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send syslogd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_syslogd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_syslogd_client_packets'($*)) dnl
-
- gen_require(`
- type syslogd_client_packet_t;
- ')
-
- allow $1 syslogd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_syslogd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send syslogd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_syslogd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_syslogd_client_packets'($*)) dnl
-
- gen_require(`
- type syslogd_client_packet_t;
- ')
-
- dontaudit $1 syslogd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_syslogd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive syslogd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_syslogd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_syslogd_client_packets'($*)) dnl
-
- gen_require(`
- type syslogd_client_packet_t;
- ')
-
- allow $1 syslogd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_syslogd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive syslogd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_syslogd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_syslogd_client_packets'($*)) dnl
-
- gen_require(`
- type syslogd_client_packet_t;
- ')
-
- dontaudit $1 syslogd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_syslogd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive syslogd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_syslogd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_syslogd_client_packets'($*)) dnl
-
- corenet_send_syslogd_client_packets($1)
- corenet_receive_syslogd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_syslogd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive syslogd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_syslogd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_syslogd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_syslogd_client_packets($1)
- corenet_dontaudit_receive_syslogd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_syslogd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to syslogd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_syslogd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_syslogd_client_packets'($*)) dnl
-
- gen_require(`
- type syslogd_client_packet_t;
- ')
-
- allow $1 syslogd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_syslogd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send syslogd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_syslogd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_syslogd_server_packets'($*)) dnl
-
- gen_require(`
- type syslogd_server_packet_t;
- ')
-
- allow $1 syslogd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_syslogd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send syslogd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_syslogd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_syslogd_server_packets'($*)) dnl
-
- gen_require(`
- type syslogd_server_packet_t;
- ')
-
- dontaudit $1 syslogd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_syslogd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive syslogd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_syslogd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_syslogd_server_packets'($*)) dnl
-
- gen_require(`
- type syslogd_server_packet_t;
- ')
-
- allow $1 syslogd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_syslogd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive syslogd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_syslogd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_syslogd_server_packets'($*)) dnl
-
- gen_require(`
- type syslogd_server_packet_t;
- ')
-
- dontaudit $1 syslogd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_syslogd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive syslogd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_syslogd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_syslogd_server_packets'($*)) dnl
-
- corenet_send_syslogd_server_packets($1)
- corenet_receive_syslogd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_syslogd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive syslogd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_syslogd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_syslogd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_syslogd_server_packets($1)
- corenet_dontaudit_receive_syslogd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_syslogd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to syslogd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_syslogd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_syslogd_server_packets'($*)) dnl
-
- gen_require(`
- type syslogd_server_packet_t;
- ')
-
- allow $1 syslogd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_syslogd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the syslog_tls port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_syslog_tls_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_syslog_tls_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_syslog_tls_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the syslog_tls port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_syslog_tls_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_syslog_tls_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_syslog_tls_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the syslog_tls port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_syslog_tls_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_syslog_tls_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_syslog_tls_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the syslog_tls port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_syslog_tls_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_syslog_tls_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_syslog_tls_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the syslog_tls port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_syslog_tls_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_syslog_tls_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_syslog_tls_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the syslog_tls port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_syslog_tls_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_syslog_tls_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_syslog_tls_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the syslog_tls port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_syslog_tls_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_syslog_tls_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_syslog_tls_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the syslog_tls port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_syslog_tls_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_syslog_tls_port'($*)) dnl
-
- gen_require(`
- type syslog_tls_port_t;
- ')
-
- allow $1 syslog_tls_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_syslog_tls_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the syslog_tls port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_syslog_tls_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_syslog_tls_port'($*)) dnl
-
- gen_require(`
- type syslog_tls_port_t;
- ')
-
- allow $1 syslog_tls_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_syslog_tls_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the syslog_tls port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_syslog_tls_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_syslog_tls_port'($*)) dnl
-
- gen_require(`
- type syslog_tls_port_t;
- ')
-
- allow $1 syslog_tls_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_syslog_tls_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send syslog_tls_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_syslog_tls_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_syslog_tls_client_packets'($*)) dnl
-
- gen_require(`
- type syslog_tls_client_packet_t;
- ')
-
- allow $1 syslog_tls_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_syslog_tls_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send syslog_tls_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_syslog_tls_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_syslog_tls_client_packets'($*)) dnl
-
- gen_require(`
- type syslog_tls_client_packet_t;
- ')
-
- dontaudit $1 syslog_tls_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_syslog_tls_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive syslog_tls_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_syslog_tls_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_syslog_tls_client_packets'($*)) dnl
-
- gen_require(`
- type syslog_tls_client_packet_t;
- ')
-
- allow $1 syslog_tls_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_syslog_tls_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive syslog_tls_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_syslog_tls_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_syslog_tls_client_packets'($*)) dnl
-
- gen_require(`
- type syslog_tls_client_packet_t;
- ')
-
- dontaudit $1 syslog_tls_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_syslog_tls_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive syslog_tls_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_syslog_tls_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_syslog_tls_client_packets'($*)) dnl
-
- corenet_send_syslog_tls_client_packets($1)
- corenet_receive_syslog_tls_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_syslog_tls_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive syslog_tls_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_syslog_tls_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_syslog_tls_client_packets'($*)) dnl
-
- corenet_dontaudit_send_syslog_tls_client_packets($1)
- corenet_dontaudit_receive_syslog_tls_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_syslog_tls_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to syslog_tls_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_syslog_tls_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_syslog_tls_client_packets'($*)) dnl
-
- gen_require(`
- type syslog_tls_client_packet_t;
- ')
-
- allow $1 syslog_tls_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_syslog_tls_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send syslog_tls_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_syslog_tls_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_syslog_tls_server_packets'($*)) dnl
-
- gen_require(`
- type syslog_tls_server_packet_t;
- ')
-
- allow $1 syslog_tls_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_syslog_tls_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send syslog_tls_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_syslog_tls_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_syslog_tls_server_packets'($*)) dnl
-
- gen_require(`
- type syslog_tls_server_packet_t;
- ')
-
- dontaudit $1 syslog_tls_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_syslog_tls_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive syslog_tls_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_syslog_tls_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_syslog_tls_server_packets'($*)) dnl
-
- gen_require(`
- type syslog_tls_server_packet_t;
- ')
-
- allow $1 syslog_tls_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_syslog_tls_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive syslog_tls_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_syslog_tls_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_syslog_tls_server_packets'($*)) dnl
-
- gen_require(`
- type syslog_tls_server_packet_t;
- ')
-
- dontaudit $1 syslog_tls_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_syslog_tls_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive syslog_tls_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_syslog_tls_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_syslog_tls_server_packets'($*)) dnl
-
- corenet_send_syslog_tls_server_packets($1)
- corenet_receive_syslog_tls_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_syslog_tls_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive syslog_tls_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_syslog_tls_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_syslog_tls_server_packets'($*)) dnl
-
- corenet_dontaudit_send_syslog_tls_server_packets($1)
- corenet_dontaudit_receive_syslog_tls_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_syslog_tls_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to syslog_tls_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_syslog_tls_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_syslog_tls_server_packets'($*)) dnl
-
- gen_require(`
- type syslog_tls_server_packet_t;
- ')
-
- allow $1 syslog_tls_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_syslog_tls_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the tcs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_tcs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_tcs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_tcs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the tcs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_tcs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_tcs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_tcs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the tcs port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_tcs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_tcs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_tcs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the tcs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_tcs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_tcs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_tcs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the tcs port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_tcs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_tcs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_tcs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the tcs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_tcs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_tcs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_tcs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the tcs port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_tcs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_tcs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_tcs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the tcs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_tcs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_tcs_port'($*)) dnl
-
- gen_require(`
- type tcs_port_t;
- ')
-
- allow $1 tcs_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_tcs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the tcs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_tcs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_tcs_port'($*)) dnl
-
- gen_require(`
- type tcs_port_t;
- ')
-
- allow $1 tcs_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_tcs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the tcs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_tcs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_tcs_port'($*)) dnl
-
- gen_require(`
- type tcs_port_t;
- ')
-
- allow $1 tcs_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_tcs_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send tcs_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_tcs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_tcs_client_packets'($*)) dnl
-
- gen_require(`
- type tcs_client_packet_t;
- ')
-
- allow $1 tcs_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_tcs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send tcs_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_tcs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_tcs_client_packets'($*)) dnl
-
- gen_require(`
- type tcs_client_packet_t;
- ')
-
- dontaudit $1 tcs_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_tcs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive tcs_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_tcs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_tcs_client_packets'($*)) dnl
-
- gen_require(`
- type tcs_client_packet_t;
- ')
-
- allow $1 tcs_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_tcs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive tcs_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_tcs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_tcs_client_packets'($*)) dnl
-
- gen_require(`
- type tcs_client_packet_t;
- ')
-
- dontaudit $1 tcs_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_tcs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive tcs_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_tcs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_tcs_client_packets'($*)) dnl
-
- corenet_send_tcs_client_packets($1)
- corenet_receive_tcs_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_tcs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive tcs_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_tcs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_tcs_client_packets'($*)) dnl
-
- corenet_dontaudit_send_tcs_client_packets($1)
- corenet_dontaudit_receive_tcs_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_tcs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to tcs_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_tcs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_tcs_client_packets'($*)) dnl
-
- gen_require(`
- type tcs_client_packet_t;
- ')
-
- allow $1 tcs_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_tcs_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send tcs_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_tcs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_tcs_server_packets'($*)) dnl
-
- gen_require(`
- type tcs_server_packet_t;
- ')
-
- allow $1 tcs_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_tcs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send tcs_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_tcs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_tcs_server_packets'($*)) dnl
-
- gen_require(`
- type tcs_server_packet_t;
- ')
-
- dontaudit $1 tcs_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_tcs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive tcs_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_tcs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_tcs_server_packets'($*)) dnl
-
- gen_require(`
- type tcs_server_packet_t;
- ')
-
- allow $1 tcs_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_tcs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive tcs_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_tcs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_tcs_server_packets'($*)) dnl
-
- gen_require(`
- type tcs_server_packet_t;
- ')
-
- dontaudit $1 tcs_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_tcs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive tcs_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_tcs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_tcs_server_packets'($*)) dnl
-
- corenet_send_tcs_server_packets($1)
- corenet_receive_tcs_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_tcs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive tcs_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_tcs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_tcs_server_packets'($*)) dnl
-
- corenet_dontaudit_send_tcs_server_packets($1)
- corenet_dontaudit_receive_tcs_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_tcs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to tcs_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_tcs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_tcs_server_packets'($*)) dnl
-
- gen_require(`
- type tcs_server_packet_t;
- ')
-
- allow $1 tcs_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_tcs_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the telnetd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_telnetd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_telnetd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_telnetd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the telnetd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_telnetd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_telnetd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_telnetd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the telnetd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_telnetd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_telnetd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_telnetd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the telnetd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_telnetd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_telnetd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_telnetd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the telnetd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_telnetd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_telnetd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_telnetd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the telnetd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_telnetd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_telnetd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_telnetd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the telnetd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_telnetd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_telnetd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_telnetd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the telnetd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_telnetd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_telnetd_port'($*)) dnl
-
- gen_require(`
- type telnetd_port_t;
- ')
-
- allow $1 telnetd_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_telnetd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the telnetd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_telnetd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_telnetd_port'($*)) dnl
-
- gen_require(`
- type telnetd_port_t;
- ')
-
- allow $1 telnetd_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_telnetd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the telnetd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_telnetd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_telnetd_port'($*)) dnl
-
- gen_require(`
- type telnetd_port_t;
- ')
-
- allow $1 telnetd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_telnetd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send telnetd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_telnetd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_telnetd_client_packets'($*)) dnl
-
- gen_require(`
- type telnetd_client_packet_t;
- ')
-
- allow $1 telnetd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_telnetd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send telnetd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_telnetd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_telnetd_client_packets'($*)) dnl
-
- gen_require(`
- type telnetd_client_packet_t;
- ')
-
- dontaudit $1 telnetd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_telnetd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive telnetd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_telnetd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_telnetd_client_packets'($*)) dnl
-
- gen_require(`
- type telnetd_client_packet_t;
- ')
-
- allow $1 telnetd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_telnetd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive telnetd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_telnetd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_telnetd_client_packets'($*)) dnl
-
- gen_require(`
- type telnetd_client_packet_t;
- ')
-
- dontaudit $1 telnetd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_telnetd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive telnetd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_telnetd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_telnetd_client_packets'($*)) dnl
-
- corenet_send_telnetd_client_packets($1)
- corenet_receive_telnetd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_telnetd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive telnetd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_telnetd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_telnetd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_telnetd_client_packets($1)
- corenet_dontaudit_receive_telnetd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_telnetd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to telnetd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_telnetd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_telnetd_client_packets'($*)) dnl
-
- gen_require(`
- type telnetd_client_packet_t;
- ')
-
- allow $1 telnetd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_telnetd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send telnetd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_telnetd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_telnetd_server_packets'($*)) dnl
-
- gen_require(`
- type telnetd_server_packet_t;
- ')
-
- allow $1 telnetd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_telnetd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send telnetd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_telnetd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_telnetd_server_packets'($*)) dnl
-
- gen_require(`
- type telnetd_server_packet_t;
- ')
-
- dontaudit $1 telnetd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_telnetd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive telnetd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_telnetd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_telnetd_server_packets'($*)) dnl
-
- gen_require(`
- type telnetd_server_packet_t;
- ')
-
- allow $1 telnetd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_telnetd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive telnetd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_telnetd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_telnetd_server_packets'($*)) dnl
-
- gen_require(`
- type telnetd_server_packet_t;
- ')
-
- dontaudit $1 telnetd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_telnetd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive telnetd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_telnetd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_telnetd_server_packets'($*)) dnl
-
- corenet_send_telnetd_server_packets($1)
- corenet_receive_telnetd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_telnetd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive telnetd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_telnetd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_telnetd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_telnetd_server_packets($1)
- corenet_dontaudit_receive_telnetd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_telnetd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to telnetd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_telnetd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_telnetd_server_packets'($*)) dnl
-
- gen_require(`
- type telnetd_server_packet_t;
- ')
-
- allow $1 telnetd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_telnetd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the tftp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_tftp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_tftp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_tftp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the tftp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_tftp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_tftp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_tftp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the tftp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_tftp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_tftp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_tftp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the tftp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_tftp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_tftp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_tftp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the tftp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_tftp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_tftp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_tftp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the tftp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_tftp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_tftp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_tftp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the tftp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_tftp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_tftp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_tftp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the tftp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_tftp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_tftp_port'($*)) dnl
-
- gen_require(`
- type tftp_port_t;
- ')
-
- allow $1 tftp_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_tftp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the tftp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_tftp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_tftp_port'($*)) dnl
-
- gen_require(`
- type tftp_port_t;
- ')
-
- allow $1 tftp_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_tftp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the tftp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_tftp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_tftp_port'($*)) dnl
-
- gen_require(`
- type tftp_port_t;
- ')
-
- allow $1 tftp_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_tftp_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send tftp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_tftp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_tftp_client_packets'($*)) dnl
-
- gen_require(`
- type tftp_client_packet_t;
- ')
-
- allow $1 tftp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_tftp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send tftp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_tftp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_tftp_client_packets'($*)) dnl
-
- gen_require(`
- type tftp_client_packet_t;
- ')
-
- dontaudit $1 tftp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_tftp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive tftp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_tftp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_tftp_client_packets'($*)) dnl
-
- gen_require(`
- type tftp_client_packet_t;
- ')
-
- allow $1 tftp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_tftp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive tftp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_tftp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_tftp_client_packets'($*)) dnl
-
- gen_require(`
- type tftp_client_packet_t;
- ')
-
- dontaudit $1 tftp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_tftp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive tftp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_tftp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_tftp_client_packets'($*)) dnl
-
- corenet_send_tftp_client_packets($1)
- corenet_receive_tftp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_tftp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive tftp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_tftp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_tftp_client_packets'($*)) dnl
-
- corenet_dontaudit_send_tftp_client_packets($1)
- corenet_dontaudit_receive_tftp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_tftp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to tftp_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_tftp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_tftp_client_packets'($*)) dnl
-
- gen_require(`
- type tftp_client_packet_t;
- ')
-
- allow $1 tftp_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_tftp_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send tftp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_tftp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_tftp_server_packets'($*)) dnl
-
- gen_require(`
- type tftp_server_packet_t;
- ')
-
- allow $1 tftp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_tftp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send tftp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_tftp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_tftp_server_packets'($*)) dnl
-
- gen_require(`
- type tftp_server_packet_t;
- ')
-
- dontaudit $1 tftp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_tftp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive tftp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_tftp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_tftp_server_packets'($*)) dnl
-
- gen_require(`
- type tftp_server_packet_t;
- ')
-
- allow $1 tftp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_tftp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive tftp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_tftp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_tftp_server_packets'($*)) dnl
-
- gen_require(`
- type tftp_server_packet_t;
- ')
-
- dontaudit $1 tftp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_tftp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive tftp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_tftp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_tftp_server_packets'($*)) dnl
-
- corenet_send_tftp_server_packets($1)
- corenet_receive_tftp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_tftp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive tftp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_tftp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_tftp_server_packets'($*)) dnl
-
- corenet_dontaudit_send_tftp_server_packets($1)
- corenet_dontaudit_receive_tftp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_tftp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to tftp_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_tftp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_tftp_server_packets'($*)) dnl
-
- gen_require(`
- type tftp_server_packet_t;
- ')
-
- allow $1 tftp_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_tftp_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the tor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_tor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_tor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_tor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the tor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_tor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_tor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_tor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the tor port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_tor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_tor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_tor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the tor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_tor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_tor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_tor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the tor port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_tor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_tor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_tor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the tor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_tor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_tor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_tor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the tor port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_tor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_tor_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_tor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the tor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_tor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_tor_port'($*)) dnl
-
- gen_require(`
- type tor_port_t;
- ')
-
- allow $1 tor_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_tor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the tor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_tor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_tor_port'($*)) dnl
-
- gen_require(`
- type tor_port_t;
- ')
-
- allow $1 tor_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_tor_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the tor port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_tor_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_tor_port'($*)) dnl
-
- gen_require(`
- type tor_port_t;
- ')
-
- allow $1 tor_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_tor_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send tor_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_tor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_tor_client_packets'($*)) dnl
-
- gen_require(`
- type tor_client_packet_t;
- ')
-
- allow $1 tor_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_tor_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send tor_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_tor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_tor_client_packets'($*)) dnl
-
- gen_require(`
- type tor_client_packet_t;
- ')
-
- dontaudit $1 tor_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_tor_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive tor_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_tor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_tor_client_packets'($*)) dnl
-
- gen_require(`
- type tor_client_packet_t;
- ')
-
- allow $1 tor_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_tor_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive tor_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_tor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_tor_client_packets'($*)) dnl
-
- gen_require(`
- type tor_client_packet_t;
- ')
-
- dontaudit $1 tor_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_tor_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive tor_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_tor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_tor_client_packets'($*)) dnl
-
- corenet_send_tor_client_packets($1)
- corenet_receive_tor_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_tor_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive tor_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_tor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_tor_client_packets'($*)) dnl
-
- corenet_dontaudit_send_tor_client_packets($1)
- corenet_dontaudit_receive_tor_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_tor_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to tor_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_tor_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_tor_client_packets'($*)) dnl
-
- gen_require(`
- type tor_client_packet_t;
- ')
-
- allow $1 tor_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_tor_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send tor_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_tor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_tor_server_packets'($*)) dnl
-
- gen_require(`
- type tor_server_packet_t;
- ')
-
- allow $1 tor_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_tor_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send tor_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_tor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_tor_server_packets'($*)) dnl
-
- gen_require(`
- type tor_server_packet_t;
- ')
-
- dontaudit $1 tor_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_tor_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive tor_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_tor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_tor_server_packets'($*)) dnl
-
- gen_require(`
- type tor_server_packet_t;
- ')
-
- allow $1 tor_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_tor_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive tor_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_tor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_tor_server_packets'($*)) dnl
-
- gen_require(`
- type tor_server_packet_t;
- ')
-
- dontaudit $1 tor_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_tor_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive tor_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_tor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_tor_server_packets'($*)) dnl
-
- corenet_send_tor_server_packets($1)
- corenet_receive_tor_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_tor_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive tor_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_tor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_tor_server_packets'($*)) dnl
-
- corenet_dontaudit_send_tor_server_packets($1)
- corenet_dontaudit_receive_tor_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_tor_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to tor_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_tor_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_tor_server_packets'($*)) dnl
-
- gen_require(`
- type tor_server_packet_t;
- ')
-
- allow $1 tor_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_tor_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the traceroute port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_traceroute_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_traceroute_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_traceroute_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the traceroute port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_traceroute_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_traceroute_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_traceroute_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the traceroute port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_traceroute_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_traceroute_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_traceroute_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the traceroute port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_traceroute_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_traceroute_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_traceroute_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the traceroute port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_traceroute_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_traceroute_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_traceroute_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the traceroute port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_traceroute_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_traceroute_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_traceroute_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the traceroute port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_traceroute_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_traceroute_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_traceroute_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the traceroute port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_traceroute_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_traceroute_port'($*)) dnl
-
- gen_require(`
- type traceroute_port_t;
- ')
-
- allow $1 traceroute_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_traceroute_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the traceroute port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_traceroute_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_traceroute_port'($*)) dnl
-
- gen_require(`
- type traceroute_port_t;
- ')
-
- allow $1 traceroute_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_traceroute_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the traceroute port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_traceroute_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_traceroute_port'($*)) dnl
-
- gen_require(`
- type traceroute_port_t;
- ')
-
- allow $1 traceroute_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_traceroute_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send traceroute_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_traceroute_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_traceroute_client_packets'($*)) dnl
-
- gen_require(`
- type traceroute_client_packet_t;
- ')
-
- allow $1 traceroute_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_traceroute_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send traceroute_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_traceroute_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_traceroute_client_packets'($*)) dnl
-
- gen_require(`
- type traceroute_client_packet_t;
- ')
-
- dontaudit $1 traceroute_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_traceroute_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive traceroute_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_traceroute_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_traceroute_client_packets'($*)) dnl
-
- gen_require(`
- type traceroute_client_packet_t;
- ')
-
- allow $1 traceroute_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_traceroute_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive traceroute_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_traceroute_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_traceroute_client_packets'($*)) dnl
-
- gen_require(`
- type traceroute_client_packet_t;
- ')
-
- dontaudit $1 traceroute_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_traceroute_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive traceroute_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_traceroute_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_traceroute_client_packets'($*)) dnl
-
- corenet_send_traceroute_client_packets($1)
- corenet_receive_traceroute_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_traceroute_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive traceroute_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_traceroute_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_traceroute_client_packets'($*)) dnl
-
- corenet_dontaudit_send_traceroute_client_packets($1)
- corenet_dontaudit_receive_traceroute_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_traceroute_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to traceroute_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_traceroute_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_traceroute_client_packets'($*)) dnl
-
- gen_require(`
- type traceroute_client_packet_t;
- ')
-
- allow $1 traceroute_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_traceroute_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send traceroute_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_traceroute_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_traceroute_server_packets'($*)) dnl
-
- gen_require(`
- type traceroute_server_packet_t;
- ')
-
- allow $1 traceroute_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_traceroute_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send traceroute_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_traceroute_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_traceroute_server_packets'($*)) dnl
-
- gen_require(`
- type traceroute_server_packet_t;
- ')
-
- dontaudit $1 traceroute_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_traceroute_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive traceroute_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_traceroute_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_traceroute_server_packets'($*)) dnl
-
- gen_require(`
- type traceroute_server_packet_t;
- ')
-
- allow $1 traceroute_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_traceroute_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive traceroute_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_traceroute_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_traceroute_server_packets'($*)) dnl
-
- gen_require(`
- type traceroute_server_packet_t;
- ')
-
- dontaudit $1 traceroute_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_traceroute_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive traceroute_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_traceroute_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_traceroute_server_packets'($*)) dnl
-
- corenet_send_traceroute_server_packets($1)
- corenet_receive_traceroute_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_traceroute_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive traceroute_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_traceroute_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_traceroute_server_packets'($*)) dnl
-
- corenet_dontaudit_send_traceroute_server_packets($1)
- corenet_dontaudit_receive_traceroute_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_traceroute_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to traceroute_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_traceroute_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_traceroute_server_packets'($*)) dnl
-
- gen_require(`
- type traceroute_server_packet_t;
- ')
-
- allow $1 traceroute_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_traceroute_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the transproxy port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_transproxy_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_transproxy_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_transproxy_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the transproxy port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_transproxy_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_transproxy_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_transproxy_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the transproxy port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_transproxy_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_transproxy_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_transproxy_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the transproxy port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_transproxy_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_transproxy_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_transproxy_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the transproxy port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_transproxy_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_transproxy_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_transproxy_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the transproxy port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_transproxy_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_transproxy_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_transproxy_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the transproxy port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_transproxy_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_transproxy_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_transproxy_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the transproxy port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_transproxy_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_transproxy_port'($*)) dnl
-
- gen_require(`
- type transproxy_port_t;
- ')
-
- allow $1 transproxy_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_transproxy_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the transproxy port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_transproxy_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_transproxy_port'($*)) dnl
-
- gen_require(`
- type transproxy_port_t;
- ')
-
- allow $1 transproxy_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_transproxy_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the transproxy port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_transproxy_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_transproxy_port'($*)) dnl
-
- gen_require(`
- type transproxy_port_t;
- ')
-
- allow $1 transproxy_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_transproxy_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send transproxy_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_transproxy_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_transproxy_client_packets'($*)) dnl
-
- gen_require(`
- type transproxy_client_packet_t;
- ')
-
- allow $1 transproxy_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_transproxy_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send transproxy_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_transproxy_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_transproxy_client_packets'($*)) dnl
-
- gen_require(`
- type transproxy_client_packet_t;
- ')
-
- dontaudit $1 transproxy_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_transproxy_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive transproxy_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_transproxy_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_transproxy_client_packets'($*)) dnl
-
- gen_require(`
- type transproxy_client_packet_t;
- ')
-
- allow $1 transproxy_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_transproxy_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive transproxy_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_transproxy_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_transproxy_client_packets'($*)) dnl
-
- gen_require(`
- type transproxy_client_packet_t;
- ')
-
- dontaudit $1 transproxy_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_transproxy_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive transproxy_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_transproxy_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_transproxy_client_packets'($*)) dnl
-
- corenet_send_transproxy_client_packets($1)
- corenet_receive_transproxy_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_transproxy_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive transproxy_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_transproxy_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_transproxy_client_packets'($*)) dnl
-
- corenet_dontaudit_send_transproxy_client_packets($1)
- corenet_dontaudit_receive_transproxy_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_transproxy_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to transproxy_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_transproxy_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_transproxy_client_packets'($*)) dnl
-
- gen_require(`
- type transproxy_client_packet_t;
- ')
-
- allow $1 transproxy_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_transproxy_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send transproxy_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_transproxy_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_transproxy_server_packets'($*)) dnl
-
- gen_require(`
- type transproxy_server_packet_t;
- ')
-
- allow $1 transproxy_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_transproxy_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send transproxy_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_transproxy_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_transproxy_server_packets'($*)) dnl
-
- gen_require(`
- type transproxy_server_packet_t;
- ')
-
- dontaudit $1 transproxy_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_transproxy_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive transproxy_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_transproxy_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_transproxy_server_packets'($*)) dnl
-
- gen_require(`
- type transproxy_server_packet_t;
- ')
-
- allow $1 transproxy_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_transproxy_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive transproxy_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_transproxy_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_transproxy_server_packets'($*)) dnl
-
- gen_require(`
- type transproxy_server_packet_t;
- ')
-
- dontaudit $1 transproxy_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_transproxy_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive transproxy_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_transproxy_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_transproxy_server_packets'($*)) dnl
-
- corenet_send_transproxy_server_packets($1)
- corenet_receive_transproxy_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_transproxy_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive transproxy_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_transproxy_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_transproxy_server_packets'($*)) dnl
-
- corenet_dontaudit_send_transproxy_server_packets($1)
- corenet_dontaudit_receive_transproxy_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_transproxy_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to transproxy_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_transproxy_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_transproxy_server_packets'($*)) dnl
-
- gen_require(`
- type transproxy_server_packet_t;
- ')
-
- allow $1 transproxy_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_transproxy_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the trisoap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_trisoap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_trisoap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_trisoap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the trisoap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_trisoap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_trisoap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_trisoap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the trisoap port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_trisoap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_trisoap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_trisoap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the trisoap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_trisoap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_trisoap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_trisoap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the trisoap port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_trisoap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_trisoap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_trisoap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the trisoap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_trisoap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_trisoap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_trisoap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the trisoap port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_trisoap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_trisoap_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_trisoap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the trisoap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_trisoap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_trisoap_port'($*)) dnl
-
- gen_require(`
- type trisoap_port_t;
- ')
-
- allow $1 trisoap_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_trisoap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the trisoap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_trisoap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_trisoap_port'($*)) dnl
-
- gen_require(`
- type trisoap_port_t;
- ')
-
- allow $1 trisoap_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_trisoap_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the trisoap port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_trisoap_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_trisoap_port'($*)) dnl
-
- gen_require(`
- type trisoap_port_t;
- ')
-
- allow $1 trisoap_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_trisoap_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send trisoap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_trisoap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_trisoap_client_packets'($*)) dnl
-
- gen_require(`
- type trisoap_client_packet_t;
- ')
-
- allow $1 trisoap_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_trisoap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send trisoap_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_trisoap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_trisoap_client_packets'($*)) dnl
-
- gen_require(`
- type trisoap_client_packet_t;
- ')
-
- dontaudit $1 trisoap_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_trisoap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive trisoap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_trisoap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_trisoap_client_packets'($*)) dnl
-
- gen_require(`
- type trisoap_client_packet_t;
- ')
-
- allow $1 trisoap_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_trisoap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive trisoap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_trisoap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_trisoap_client_packets'($*)) dnl
-
- gen_require(`
- type trisoap_client_packet_t;
- ')
-
- dontaudit $1 trisoap_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_trisoap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive trisoap_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_trisoap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_trisoap_client_packets'($*)) dnl
-
- corenet_send_trisoap_client_packets($1)
- corenet_receive_trisoap_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_trisoap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive trisoap_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_trisoap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_trisoap_client_packets'($*)) dnl
-
- corenet_dontaudit_send_trisoap_client_packets($1)
- corenet_dontaudit_receive_trisoap_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_trisoap_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to trisoap_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_trisoap_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_trisoap_client_packets'($*)) dnl
-
- gen_require(`
- type trisoap_client_packet_t;
- ')
-
- allow $1 trisoap_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_trisoap_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send trisoap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_trisoap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_trisoap_server_packets'($*)) dnl
-
- gen_require(`
- type trisoap_server_packet_t;
- ')
-
- allow $1 trisoap_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_trisoap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send trisoap_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_trisoap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_trisoap_server_packets'($*)) dnl
-
- gen_require(`
- type trisoap_server_packet_t;
- ')
-
- dontaudit $1 trisoap_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_trisoap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive trisoap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_trisoap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_trisoap_server_packets'($*)) dnl
-
- gen_require(`
- type trisoap_server_packet_t;
- ')
-
- allow $1 trisoap_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_trisoap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive trisoap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_trisoap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_trisoap_server_packets'($*)) dnl
-
- gen_require(`
- type trisoap_server_packet_t;
- ')
-
- dontaudit $1 trisoap_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_trisoap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive trisoap_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_trisoap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_trisoap_server_packets'($*)) dnl
-
- corenet_send_trisoap_server_packets($1)
- corenet_receive_trisoap_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_trisoap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive trisoap_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_trisoap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_trisoap_server_packets'($*)) dnl
-
- corenet_dontaudit_send_trisoap_server_packets($1)
- corenet_dontaudit_receive_trisoap_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_trisoap_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to trisoap_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_trisoap_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_trisoap_server_packets'($*)) dnl
-
- gen_require(`
- type trisoap_server_packet_t;
- ')
-
- allow $1 trisoap_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_trisoap_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the trivnet1 port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_trivnet1_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_trivnet1_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_trivnet1_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the trivnet1 port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_trivnet1_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_trivnet1_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_trivnet1_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the trivnet1 port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_trivnet1_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_trivnet1_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_trivnet1_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the trivnet1 port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_trivnet1_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_trivnet1_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_trivnet1_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the trivnet1 port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_trivnet1_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_trivnet1_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_trivnet1_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the trivnet1 port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_trivnet1_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_trivnet1_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_trivnet1_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the trivnet1 port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_trivnet1_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_trivnet1_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_trivnet1_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the trivnet1 port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_trivnet1_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_trivnet1_port'($*)) dnl
-
- gen_require(`
- type trivnet1_port_t;
- ')
-
- allow $1 trivnet1_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_trivnet1_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the trivnet1 port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_trivnet1_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_trivnet1_port'($*)) dnl
-
- gen_require(`
- type trivnet1_port_t;
- ')
-
- allow $1 trivnet1_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_trivnet1_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the trivnet1 port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_trivnet1_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_trivnet1_port'($*)) dnl
-
- gen_require(`
- type trivnet1_port_t;
- ')
-
- allow $1 trivnet1_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_trivnet1_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send trivnet1_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_trivnet1_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_trivnet1_client_packets'($*)) dnl
-
- gen_require(`
- type trivnet1_client_packet_t;
- ')
-
- allow $1 trivnet1_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_trivnet1_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send trivnet1_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_trivnet1_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_trivnet1_client_packets'($*)) dnl
-
- gen_require(`
- type trivnet1_client_packet_t;
- ')
-
- dontaudit $1 trivnet1_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_trivnet1_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive trivnet1_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_trivnet1_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_trivnet1_client_packets'($*)) dnl
-
- gen_require(`
- type trivnet1_client_packet_t;
- ')
-
- allow $1 trivnet1_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_trivnet1_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive trivnet1_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_trivnet1_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_trivnet1_client_packets'($*)) dnl
-
- gen_require(`
- type trivnet1_client_packet_t;
- ')
-
- dontaudit $1 trivnet1_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_trivnet1_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive trivnet1_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_trivnet1_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_trivnet1_client_packets'($*)) dnl
-
- corenet_send_trivnet1_client_packets($1)
- corenet_receive_trivnet1_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_trivnet1_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive trivnet1_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_trivnet1_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_trivnet1_client_packets'($*)) dnl
-
- corenet_dontaudit_send_trivnet1_client_packets($1)
- corenet_dontaudit_receive_trivnet1_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_trivnet1_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to trivnet1_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_trivnet1_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_trivnet1_client_packets'($*)) dnl
-
- gen_require(`
- type trivnet1_client_packet_t;
- ')
-
- allow $1 trivnet1_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_trivnet1_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send trivnet1_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_trivnet1_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_trivnet1_server_packets'($*)) dnl
-
- gen_require(`
- type trivnet1_server_packet_t;
- ')
-
- allow $1 trivnet1_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_trivnet1_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send trivnet1_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_trivnet1_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_trivnet1_server_packets'($*)) dnl
-
- gen_require(`
- type trivnet1_server_packet_t;
- ')
-
- dontaudit $1 trivnet1_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_trivnet1_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive trivnet1_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_trivnet1_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_trivnet1_server_packets'($*)) dnl
-
- gen_require(`
- type trivnet1_server_packet_t;
- ')
-
- allow $1 trivnet1_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_trivnet1_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive trivnet1_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_trivnet1_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_trivnet1_server_packets'($*)) dnl
-
- gen_require(`
- type trivnet1_server_packet_t;
- ')
-
- dontaudit $1 trivnet1_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_trivnet1_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive trivnet1_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_trivnet1_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_trivnet1_server_packets'($*)) dnl
-
- corenet_send_trivnet1_server_packets($1)
- corenet_receive_trivnet1_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_trivnet1_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive trivnet1_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_trivnet1_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_trivnet1_server_packets'($*)) dnl
-
- corenet_dontaudit_send_trivnet1_server_packets($1)
- corenet_dontaudit_receive_trivnet1_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_trivnet1_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to trivnet1_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_trivnet1_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_trivnet1_server_packets'($*)) dnl
-
- gen_require(`
- type trivnet1_server_packet_t;
- ')
-
- allow $1 trivnet1_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_trivnet1_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the ups port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_ups_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ups_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ups_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the ups port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_ups_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ups_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_ups_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the ups port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_ups_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ups_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ups_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the ups port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_ups_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ups_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ups_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the ups port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_ups_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ups_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ups_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the ups port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_ups_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ups_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ups_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the ups port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_ups_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ups_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ups_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the ups port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_ups_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ups_port'($*)) dnl
-
- gen_require(`
- type ups_port_t;
- ')
-
- allow $1 ups_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ups_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the ups port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_ups_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ups_port'($*)) dnl
-
- gen_require(`
- type ups_port_t;
- ')
-
- allow $1 ups_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ups_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the ups port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_ups_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ups_port'($*)) dnl
-
- gen_require(`
- type ups_port_t;
- ')
-
- allow $1 ups_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ups_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ups_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ups_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ups_client_packets'($*)) dnl
-
- gen_require(`
- type ups_client_packet_t;
- ')
-
- allow $1 ups_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ups_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ups_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ups_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ups_client_packets'($*)) dnl
-
- gen_require(`
- type ups_client_packet_t;
- ')
-
- dontaudit $1 ups_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ups_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ups_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ups_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ups_client_packets'($*)) dnl
-
- gen_require(`
- type ups_client_packet_t;
- ')
-
- allow $1 ups_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ups_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ups_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ups_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ups_client_packets'($*)) dnl
-
- gen_require(`
- type ups_client_packet_t;
- ')
-
- dontaudit $1 ups_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ups_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ups_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ups_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ups_client_packets'($*)) dnl
-
- corenet_send_ups_client_packets($1)
- corenet_receive_ups_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ups_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ups_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ups_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ups_client_packets'($*)) dnl
-
- corenet_dontaudit_send_ups_client_packets($1)
- corenet_dontaudit_receive_ups_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ups_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ups_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ups_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ups_client_packets'($*)) dnl
-
- gen_require(`
- type ups_client_packet_t;
- ')
-
- allow $1 ups_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ups_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send ups_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_ups_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_ups_server_packets'($*)) dnl
-
- gen_require(`
- type ups_server_packet_t;
- ')
-
- allow $1 ups_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_ups_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send ups_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_ups_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ups_server_packets'($*)) dnl
-
- gen_require(`
- type ups_server_packet_t;
- ')
-
- dontaudit $1 ups_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ups_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive ups_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_ups_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_ups_server_packets'($*)) dnl
-
- gen_require(`
- type ups_server_packet_t;
- ')
-
- allow $1 ups_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_ups_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive ups_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_ups_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ups_server_packets'($*)) dnl
-
- gen_require(`
- type ups_server_packet_t;
- ')
-
- dontaudit $1 ups_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ups_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive ups_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_ups_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ups_server_packets'($*)) dnl
-
- corenet_send_ups_server_packets($1)
- corenet_receive_ups_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ups_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive ups_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_ups_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ups_server_packets'($*)) dnl
-
- corenet_dontaudit_send_ups_server_packets($1)
- corenet_dontaudit_receive_ups_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ups_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to ups_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_ups_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ups_server_packets'($*)) dnl
-
- gen_require(`
- type ups_server_packet_t;
- ')
-
- allow $1 ups_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_ups_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the utcpserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_utcpserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_utcpserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_utcpserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the utcpserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_utcpserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_utcpserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_utcpserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the utcpserver port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_utcpserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_utcpserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_utcpserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the utcpserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_utcpserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_utcpserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_utcpserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the utcpserver port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_utcpserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_utcpserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_utcpserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the utcpserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_utcpserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_utcpserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_utcpserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the utcpserver port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_utcpserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_utcpserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_utcpserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the utcpserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_utcpserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_utcpserver_port'($*)) dnl
-
- gen_require(`
- type utcpserver_port_t;
- ')
-
- allow $1 utcpserver_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_utcpserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the utcpserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_utcpserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_utcpserver_port'($*)) dnl
-
- gen_require(`
- type utcpserver_port_t;
- ')
-
- allow $1 utcpserver_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_utcpserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the utcpserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_utcpserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_utcpserver_port'($*)) dnl
-
- gen_require(`
- type utcpserver_port_t;
- ')
-
- allow $1 utcpserver_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_utcpserver_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send utcpserver_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_utcpserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_utcpserver_client_packets'($*)) dnl
-
- gen_require(`
- type utcpserver_client_packet_t;
- ')
-
- allow $1 utcpserver_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_utcpserver_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send utcpserver_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_utcpserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_utcpserver_client_packets'($*)) dnl
-
- gen_require(`
- type utcpserver_client_packet_t;
- ')
-
- dontaudit $1 utcpserver_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_utcpserver_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive utcpserver_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_utcpserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_utcpserver_client_packets'($*)) dnl
-
- gen_require(`
- type utcpserver_client_packet_t;
- ')
-
- allow $1 utcpserver_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_utcpserver_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive utcpserver_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_utcpserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_utcpserver_client_packets'($*)) dnl
-
- gen_require(`
- type utcpserver_client_packet_t;
- ')
-
- dontaudit $1 utcpserver_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_utcpserver_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive utcpserver_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_utcpserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_utcpserver_client_packets'($*)) dnl
-
- corenet_send_utcpserver_client_packets($1)
- corenet_receive_utcpserver_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_utcpserver_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive utcpserver_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_utcpserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_utcpserver_client_packets'($*)) dnl
-
- corenet_dontaudit_send_utcpserver_client_packets($1)
- corenet_dontaudit_receive_utcpserver_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_utcpserver_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to utcpserver_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_utcpserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_utcpserver_client_packets'($*)) dnl
-
- gen_require(`
- type utcpserver_client_packet_t;
- ')
-
- allow $1 utcpserver_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_utcpserver_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send utcpserver_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_utcpserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_utcpserver_server_packets'($*)) dnl
-
- gen_require(`
- type utcpserver_server_packet_t;
- ')
-
- allow $1 utcpserver_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_utcpserver_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send utcpserver_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_utcpserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_utcpserver_server_packets'($*)) dnl
-
- gen_require(`
- type utcpserver_server_packet_t;
- ')
-
- dontaudit $1 utcpserver_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_utcpserver_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive utcpserver_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_utcpserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_utcpserver_server_packets'($*)) dnl
-
- gen_require(`
- type utcpserver_server_packet_t;
- ')
-
- allow $1 utcpserver_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_utcpserver_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive utcpserver_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_utcpserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_utcpserver_server_packets'($*)) dnl
-
- gen_require(`
- type utcpserver_server_packet_t;
- ')
-
- dontaudit $1 utcpserver_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_utcpserver_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive utcpserver_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_utcpserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_utcpserver_server_packets'($*)) dnl
-
- corenet_send_utcpserver_server_packets($1)
- corenet_receive_utcpserver_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_utcpserver_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive utcpserver_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_utcpserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_utcpserver_server_packets'($*)) dnl
-
- corenet_dontaudit_send_utcpserver_server_packets($1)
- corenet_dontaudit_receive_utcpserver_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_utcpserver_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to utcpserver_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_utcpserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_utcpserver_server_packets'($*)) dnl
-
- gen_require(`
- type utcpserver_server_packet_t;
- ')
-
- allow $1 utcpserver_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_utcpserver_server_packets'($*)) dnl
- ')
-
-
- # no defined portcon
-
-
-########################################
-##
-## Send and receive TCP traffic on the uucpd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_uucpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_uucpd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_uucpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the uucpd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_uucpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_uucpd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_uucpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the uucpd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_uucpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_uucpd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_uucpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the uucpd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_uucpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_uucpd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_uucpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the uucpd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_uucpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_uucpd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_uucpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the uucpd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_uucpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_uucpd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_uucpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the uucpd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_uucpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_uucpd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_uucpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the uucpd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_uucpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_uucpd_port'($*)) dnl
-
- gen_require(`
- type uucpd_port_t;
- ')
-
- allow $1 uucpd_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_uucpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the uucpd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_uucpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_uucpd_port'($*)) dnl
-
- gen_require(`
- type uucpd_port_t;
- ')
-
- allow $1 uucpd_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_uucpd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the uucpd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_uucpd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_uucpd_port'($*)) dnl
-
- gen_require(`
- type uucpd_port_t;
- ')
-
- allow $1 uucpd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_uucpd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send uucpd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_uucpd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_uucpd_client_packets'($*)) dnl
-
- gen_require(`
- type uucpd_client_packet_t;
- ')
-
- allow $1 uucpd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_uucpd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send uucpd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_uucpd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_uucpd_client_packets'($*)) dnl
-
- gen_require(`
- type uucpd_client_packet_t;
- ')
-
- dontaudit $1 uucpd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_uucpd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive uucpd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_uucpd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_uucpd_client_packets'($*)) dnl
-
- gen_require(`
- type uucpd_client_packet_t;
- ')
-
- allow $1 uucpd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_uucpd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive uucpd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_uucpd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_uucpd_client_packets'($*)) dnl
-
- gen_require(`
- type uucpd_client_packet_t;
- ')
-
- dontaudit $1 uucpd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_uucpd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive uucpd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_uucpd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_uucpd_client_packets'($*)) dnl
-
- corenet_send_uucpd_client_packets($1)
- corenet_receive_uucpd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_uucpd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive uucpd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_uucpd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_uucpd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_uucpd_client_packets($1)
- corenet_dontaudit_receive_uucpd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_uucpd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to uucpd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_uucpd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_uucpd_client_packets'($*)) dnl
-
- gen_require(`
- type uucpd_client_packet_t;
- ')
-
- allow $1 uucpd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_uucpd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send uucpd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_uucpd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_uucpd_server_packets'($*)) dnl
-
- gen_require(`
- type uucpd_server_packet_t;
- ')
-
- allow $1 uucpd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_uucpd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send uucpd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_uucpd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_uucpd_server_packets'($*)) dnl
-
- gen_require(`
- type uucpd_server_packet_t;
- ')
-
- dontaudit $1 uucpd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_uucpd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive uucpd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_uucpd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_uucpd_server_packets'($*)) dnl
-
- gen_require(`
- type uucpd_server_packet_t;
- ')
-
- allow $1 uucpd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_uucpd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive uucpd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_uucpd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_uucpd_server_packets'($*)) dnl
-
- gen_require(`
- type uucpd_server_packet_t;
- ')
-
- dontaudit $1 uucpd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_uucpd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive uucpd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_uucpd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_uucpd_server_packets'($*)) dnl
-
- corenet_send_uucpd_server_packets($1)
- corenet_receive_uucpd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_uucpd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive uucpd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_uucpd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_uucpd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_uucpd_server_packets($1)
- corenet_dontaudit_receive_uucpd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_uucpd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to uucpd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_uucpd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_uucpd_server_packets'($*)) dnl
-
- gen_require(`
- type uucpd_server_packet_t;
- ')
-
- allow $1 uucpd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_uucpd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the varnishd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_varnishd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_varnishd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_varnishd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the varnishd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_varnishd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_varnishd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_varnishd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the varnishd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_varnishd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_varnishd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_varnishd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the varnishd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_varnishd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_varnishd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_varnishd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the varnishd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_varnishd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_varnishd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_varnishd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the varnishd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_varnishd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_varnishd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_varnishd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the varnishd port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_varnishd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_varnishd_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_varnishd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the varnishd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_varnishd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_varnishd_port'($*)) dnl
-
- gen_require(`
- type varnishd_port_t;
- ')
-
- allow $1 varnishd_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_varnishd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the varnishd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_varnishd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_varnishd_port'($*)) dnl
-
- gen_require(`
- type varnishd_port_t;
- ')
-
- allow $1 varnishd_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_varnishd_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the varnishd port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_varnishd_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_varnishd_port'($*)) dnl
-
- gen_require(`
- type varnishd_port_t;
- ')
-
- allow $1 varnishd_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_varnishd_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send varnishd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_varnishd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_varnishd_client_packets'($*)) dnl
-
- gen_require(`
- type varnishd_client_packet_t;
- ')
-
- allow $1 varnishd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_varnishd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send varnishd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_varnishd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_varnishd_client_packets'($*)) dnl
-
- gen_require(`
- type varnishd_client_packet_t;
- ')
-
- dontaudit $1 varnishd_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_varnishd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive varnishd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_varnishd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_varnishd_client_packets'($*)) dnl
-
- gen_require(`
- type varnishd_client_packet_t;
- ')
-
- allow $1 varnishd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_varnishd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive varnishd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_varnishd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_varnishd_client_packets'($*)) dnl
-
- gen_require(`
- type varnishd_client_packet_t;
- ')
-
- dontaudit $1 varnishd_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_varnishd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive varnishd_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_varnishd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_varnishd_client_packets'($*)) dnl
-
- corenet_send_varnishd_client_packets($1)
- corenet_receive_varnishd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_varnishd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive varnishd_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_varnishd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_varnishd_client_packets'($*)) dnl
-
- corenet_dontaudit_send_varnishd_client_packets($1)
- corenet_dontaudit_receive_varnishd_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_varnishd_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to varnishd_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_varnishd_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_varnishd_client_packets'($*)) dnl
-
- gen_require(`
- type varnishd_client_packet_t;
- ')
-
- allow $1 varnishd_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_varnishd_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send varnishd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_varnishd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_varnishd_server_packets'($*)) dnl
-
- gen_require(`
- type varnishd_server_packet_t;
- ')
-
- allow $1 varnishd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_varnishd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send varnishd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_varnishd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_varnishd_server_packets'($*)) dnl
-
- gen_require(`
- type varnishd_server_packet_t;
- ')
-
- dontaudit $1 varnishd_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_varnishd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive varnishd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_varnishd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_varnishd_server_packets'($*)) dnl
-
- gen_require(`
- type varnishd_server_packet_t;
- ')
-
- allow $1 varnishd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_varnishd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive varnishd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_varnishd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_varnishd_server_packets'($*)) dnl
-
- gen_require(`
- type varnishd_server_packet_t;
- ')
-
- dontaudit $1 varnishd_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_varnishd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive varnishd_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_varnishd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_varnishd_server_packets'($*)) dnl
-
- corenet_send_varnishd_server_packets($1)
- corenet_receive_varnishd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_varnishd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive varnishd_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_varnishd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_varnishd_server_packets'($*)) dnl
-
- corenet_dontaudit_send_varnishd_server_packets($1)
- corenet_dontaudit_receive_varnishd_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_varnishd_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to varnishd_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_varnishd_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_varnishd_server_packets'($*)) dnl
-
- gen_require(`
- type varnishd_server_packet_t;
- ')
-
- allow $1 varnishd_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_varnishd_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the virt port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_virt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_virt_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_virt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the virt port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_virt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_virt_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_virt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the virt port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_virt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_virt_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_virt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the virt port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_virt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_virt_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_virt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the virt port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_virt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_virt_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_virt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the virt port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_virt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_virt_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_virt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the virt port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_virt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_virt_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_virt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the virt port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_virt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_virt_port'($*)) dnl
-
- gen_require(`
- type virt_port_t;
- ')
-
- allow $1 virt_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_virt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the virt port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_virt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_virt_port'($*)) dnl
-
- gen_require(`
- type virt_port_t;
- ')
-
- allow $1 virt_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_virt_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the virt port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_virt_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_virt_port'($*)) dnl
-
- gen_require(`
- type virt_port_t;
- ')
-
- allow $1 virt_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_virt_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send virt_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_virt_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_virt_client_packets'($*)) dnl
-
- gen_require(`
- type virt_client_packet_t;
- ')
-
- allow $1 virt_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_virt_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send virt_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_virt_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_virt_client_packets'($*)) dnl
-
- gen_require(`
- type virt_client_packet_t;
- ')
-
- dontaudit $1 virt_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_virt_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive virt_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_virt_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_virt_client_packets'($*)) dnl
-
- gen_require(`
- type virt_client_packet_t;
- ')
-
- allow $1 virt_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_virt_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive virt_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_virt_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_virt_client_packets'($*)) dnl
-
- gen_require(`
- type virt_client_packet_t;
- ')
-
- dontaudit $1 virt_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_virt_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive virt_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_virt_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_virt_client_packets'($*)) dnl
-
- corenet_send_virt_client_packets($1)
- corenet_receive_virt_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_virt_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive virt_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_virt_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_virt_client_packets'($*)) dnl
-
- corenet_dontaudit_send_virt_client_packets($1)
- corenet_dontaudit_receive_virt_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_virt_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to virt_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_virt_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_virt_client_packets'($*)) dnl
-
- gen_require(`
- type virt_client_packet_t;
- ')
-
- allow $1 virt_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_virt_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send virt_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_virt_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_virt_server_packets'($*)) dnl
-
- gen_require(`
- type virt_server_packet_t;
- ')
-
- allow $1 virt_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_virt_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send virt_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_virt_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_virt_server_packets'($*)) dnl
-
- gen_require(`
- type virt_server_packet_t;
- ')
-
- dontaudit $1 virt_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_virt_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive virt_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_virt_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_virt_server_packets'($*)) dnl
-
- gen_require(`
- type virt_server_packet_t;
- ')
-
- allow $1 virt_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_virt_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive virt_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_virt_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_virt_server_packets'($*)) dnl
-
- gen_require(`
- type virt_server_packet_t;
- ')
-
- dontaudit $1 virt_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_virt_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive virt_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_virt_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_virt_server_packets'($*)) dnl
-
- corenet_send_virt_server_packets($1)
- corenet_receive_virt_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_virt_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive virt_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_virt_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_virt_server_packets'($*)) dnl
-
- corenet_dontaudit_send_virt_server_packets($1)
- corenet_dontaudit_receive_virt_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_virt_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to virt_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_virt_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_virt_server_packets'($*)) dnl
-
- gen_require(`
- type virt_server_packet_t;
- ')
-
- allow $1 virt_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_virt_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the virtual_places port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_virtual_places_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_virtual_places_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_virtual_places_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the virtual_places port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_virtual_places_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_virtual_places_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_virtual_places_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the virtual_places port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_virtual_places_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_virtual_places_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_virtual_places_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the virtual_places port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_virtual_places_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_virtual_places_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_virtual_places_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the virtual_places port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_virtual_places_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_virtual_places_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_virtual_places_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the virtual_places port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_virtual_places_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_virtual_places_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_virtual_places_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the virtual_places port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_virtual_places_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_virtual_places_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_virtual_places_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the virtual_places port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_virtual_places_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_virtual_places_port'($*)) dnl
-
- gen_require(`
- type virtual_places_port_t;
- ')
-
- allow $1 virtual_places_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_virtual_places_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the virtual_places port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_virtual_places_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_virtual_places_port'($*)) dnl
-
- gen_require(`
- type virtual_places_port_t;
- ')
-
- allow $1 virtual_places_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_virtual_places_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the virtual_places port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_virtual_places_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_virtual_places_port'($*)) dnl
-
- gen_require(`
- type virtual_places_port_t;
- ')
-
- allow $1 virtual_places_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_virtual_places_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send virtual_places_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_virtual_places_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_virtual_places_client_packets'($*)) dnl
-
- gen_require(`
- type virtual_places_client_packet_t;
- ')
-
- allow $1 virtual_places_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_virtual_places_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send virtual_places_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_virtual_places_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_virtual_places_client_packets'($*)) dnl
-
- gen_require(`
- type virtual_places_client_packet_t;
- ')
-
- dontaudit $1 virtual_places_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_virtual_places_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive virtual_places_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_virtual_places_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_virtual_places_client_packets'($*)) dnl
-
- gen_require(`
- type virtual_places_client_packet_t;
- ')
-
- allow $1 virtual_places_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_virtual_places_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive virtual_places_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_virtual_places_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_virtual_places_client_packets'($*)) dnl
-
- gen_require(`
- type virtual_places_client_packet_t;
- ')
-
- dontaudit $1 virtual_places_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_virtual_places_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive virtual_places_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_virtual_places_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_virtual_places_client_packets'($*)) dnl
-
- corenet_send_virtual_places_client_packets($1)
- corenet_receive_virtual_places_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_virtual_places_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive virtual_places_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_virtual_places_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_virtual_places_client_packets'($*)) dnl
-
- corenet_dontaudit_send_virtual_places_client_packets($1)
- corenet_dontaudit_receive_virtual_places_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_virtual_places_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to virtual_places_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_virtual_places_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_virtual_places_client_packets'($*)) dnl
-
- gen_require(`
- type virtual_places_client_packet_t;
- ')
-
- allow $1 virtual_places_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_virtual_places_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send virtual_places_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_virtual_places_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_virtual_places_server_packets'($*)) dnl
-
- gen_require(`
- type virtual_places_server_packet_t;
- ')
-
- allow $1 virtual_places_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_virtual_places_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send virtual_places_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_virtual_places_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_virtual_places_server_packets'($*)) dnl
-
- gen_require(`
- type virtual_places_server_packet_t;
- ')
-
- dontaudit $1 virtual_places_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_virtual_places_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive virtual_places_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_virtual_places_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_virtual_places_server_packets'($*)) dnl
-
- gen_require(`
- type virtual_places_server_packet_t;
- ')
-
- allow $1 virtual_places_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_virtual_places_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive virtual_places_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_virtual_places_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_virtual_places_server_packets'($*)) dnl
-
- gen_require(`
- type virtual_places_server_packet_t;
- ')
-
- dontaudit $1 virtual_places_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_virtual_places_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive virtual_places_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_virtual_places_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_virtual_places_server_packets'($*)) dnl
-
- corenet_send_virtual_places_server_packets($1)
- corenet_receive_virtual_places_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_virtual_places_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive virtual_places_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_virtual_places_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_virtual_places_server_packets'($*)) dnl
-
- corenet_dontaudit_send_virtual_places_server_packets($1)
- corenet_dontaudit_receive_virtual_places_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_virtual_places_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to virtual_places_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_virtual_places_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_virtual_places_server_packets'($*)) dnl
-
- gen_require(`
- type virtual_places_server_packet_t;
- ')
-
- allow $1 virtual_places_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_virtual_places_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the virt_migration port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_virt_migration_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_virt_migration_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_virt_migration_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the virt_migration port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_virt_migration_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_virt_migration_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_virt_migration_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the virt_migration port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_virt_migration_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_virt_migration_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_virt_migration_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the virt_migration port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_virt_migration_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_virt_migration_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_virt_migration_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the virt_migration port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_virt_migration_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_virt_migration_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_virt_migration_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the virt_migration port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_virt_migration_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_virt_migration_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_virt_migration_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the virt_migration port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_virt_migration_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_virt_migration_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_virt_migration_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the virt_migration port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_virt_migration_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_virt_migration_port'($*)) dnl
-
- gen_require(`
- type virt_migration_port_t;
- ')
-
- allow $1 virt_migration_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_virt_migration_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the virt_migration port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_virt_migration_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_virt_migration_port'($*)) dnl
-
- gen_require(`
- type virt_migration_port_t;
- ')
-
- allow $1 virt_migration_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_virt_migration_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the virt_migration port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_virt_migration_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_virt_migration_port'($*)) dnl
-
- gen_require(`
- type virt_migration_port_t;
- ')
-
- allow $1 virt_migration_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_virt_migration_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send virt_migration_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_virt_migration_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_virt_migration_client_packets'($*)) dnl
-
- gen_require(`
- type virt_migration_client_packet_t;
- ')
-
- allow $1 virt_migration_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_virt_migration_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send virt_migration_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_virt_migration_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_virt_migration_client_packets'($*)) dnl
-
- gen_require(`
- type virt_migration_client_packet_t;
- ')
-
- dontaudit $1 virt_migration_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_virt_migration_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive virt_migration_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_virt_migration_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_virt_migration_client_packets'($*)) dnl
-
- gen_require(`
- type virt_migration_client_packet_t;
- ')
-
- allow $1 virt_migration_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_virt_migration_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive virt_migration_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_virt_migration_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_virt_migration_client_packets'($*)) dnl
-
- gen_require(`
- type virt_migration_client_packet_t;
- ')
-
- dontaudit $1 virt_migration_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_virt_migration_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive virt_migration_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_virt_migration_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_virt_migration_client_packets'($*)) dnl
-
- corenet_send_virt_migration_client_packets($1)
- corenet_receive_virt_migration_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_virt_migration_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive virt_migration_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_virt_migration_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_virt_migration_client_packets'($*)) dnl
-
- corenet_dontaudit_send_virt_migration_client_packets($1)
- corenet_dontaudit_receive_virt_migration_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_virt_migration_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to virt_migration_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_virt_migration_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_virt_migration_client_packets'($*)) dnl
-
- gen_require(`
- type virt_migration_client_packet_t;
- ')
-
- allow $1 virt_migration_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_virt_migration_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send virt_migration_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_virt_migration_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_virt_migration_server_packets'($*)) dnl
-
- gen_require(`
- type virt_migration_server_packet_t;
- ')
-
- allow $1 virt_migration_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_virt_migration_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send virt_migration_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_virt_migration_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_virt_migration_server_packets'($*)) dnl
-
- gen_require(`
- type virt_migration_server_packet_t;
- ')
-
- dontaudit $1 virt_migration_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_virt_migration_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive virt_migration_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_virt_migration_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_virt_migration_server_packets'($*)) dnl
-
- gen_require(`
- type virt_migration_server_packet_t;
- ')
-
- allow $1 virt_migration_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_virt_migration_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive virt_migration_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_virt_migration_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_virt_migration_server_packets'($*)) dnl
-
- gen_require(`
- type virt_migration_server_packet_t;
- ')
-
- dontaudit $1 virt_migration_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_virt_migration_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive virt_migration_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_virt_migration_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_virt_migration_server_packets'($*)) dnl
-
- corenet_send_virt_migration_server_packets($1)
- corenet_receive_virt_migration_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_virt_migration_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive virt_migration_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_virt_migration_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_virt_migration_server_packets'($*)) dnl
-
- corenet_dontaudit_send_virt_migration_server_packets($1)
- corenet_dontaudit_receive_virt_migration_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_virt_migration_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to virt_migration_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_virt_migration_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_virt_migration_server_packets'($*)) dnl
-
- gen_require(`
- type virt_migration_server_packet_t;
- ')
-
- allow $1 virt_migration_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_virt_migration_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the vnc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_vnc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_vnc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_vnc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the vnc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_vnc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_vnc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_vnc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the vnc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_vnc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_vnc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_vnc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the vnc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_vnc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_vnc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_vnc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the vnc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_vnc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_vnc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_vnc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the vnc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_vnc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_vnc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_vnc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the vnc port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_vnc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_vnc_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_vnc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the vnc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_vnc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_vnc_port'($*)) dnl
-
- gen_require(`
- type vnc_port_t;
- ')
-
- allow $1 vnc_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_vnc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the vnc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_vnc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_vnc_port'($*)) dnl
-
- gen_require(`
- type vnc_port_t;
- ')
-
- allow $1 vnc_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_vnc_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the vnc port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_vnc_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_vnc_port'($*)) dnl
-
- gen_require(`
- type vnc_port_t;
- ')
-
- allow $1 vnc_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_vnc_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send vnc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_vnc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_vnc_client_packets'($*)) dnl
-
- gen_require(`
- type vnc_client_packet_t;
- ')
-
- allow $1 vnc_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_vnc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send vnc_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_vnc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_vnc_client_packets'($*)) dnl
-
- gen_require(`
- type vnc_client_packet_t;
- ')
-
- dontaudit $1 vnc_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_vnc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive vnc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_vnc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_vnc_client_packets'($*)) dnl
-
- gen_require(`
- type vnc_client_packet_t;
- ')
-
- allow $1 vnc_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_vnc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive vnc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_vnc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_vnc_client_packets'($*)) dnl
-
- gen_require(`
- type vnc_client_packet_t;
- ')
-
- dontaudit $1 vnc_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_vnc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive vnc_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_vnc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_vnc_client_packets'($*)) dnl
-
- corenet_send_vnc_client_packets($1)
- corenet_receive_vnc_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_vnc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive vnc_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_vnc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_vnc_client_packets'($*)) dnl
-
- corenet_dontaudit_send_vnc_client_packets($1)
- corenet_dontaudit_receive_vnc_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_vnc_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to vnc_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_vnc_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_vnc_client_packets'($*)) dnl
-
- gen_require(`
- type vnc_client_packet_t;
- ')
-
- allow $1 vnc_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_vnc_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send vnc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_vnc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_vnc_server_packets'($*)) dnl
-
- gen_require(`
- type vnc_server_packet_t;
- ')
-
- allow $1 vnc_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_vnc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send vnc_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_vnc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_vnc_server_packets'($*)) dnl
-
- gen_require(`
- type vnc_server_packet_t;
- ')
-
- dontaudit $1 vnc_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_vnc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive vnc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_vnc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_vnc_server_packets'($*)) dnl
-
- gen_require(`
- type vnc_server_packet_t;
- ')
-
- allow $1 vnc_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_vnc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive vnc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_vnc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_vnc_server_packets'($*)) dnl
-
- gen_require(`
- type vnc_server_packet_t;
- ')
-
- dontaudit $1 vnc_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_vnc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive vnc_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_vnc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_vnc_server_packets'($*)) dnl
-
- corenet_send_vnc_server_packets($1)
- corenet_receive_vnc_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_vnc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive vnc_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_vnc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_vnc_server_packets'($*)) dnl
-
- corenet_dontaudit_send_vnc_server_packets($1)
- corenet_dontaudit_receive_vnc_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_vnc_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to vnc_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_vnc_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_vnc_server_packets'($*)) dnl
-
- gen_require(`
- type vnc_server_packet_t;
- ')
-
- allow $1 vnc_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_vnc_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the wccp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_wccp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_wccp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_wccp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the wccp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_wccp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_wccp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_wccp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the wccp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_wccp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_wccp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_wccp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the wccp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_wccp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_wccp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_wccp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the wccp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_wccp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_wccp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_wccp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the wccp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_wccp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_wccp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_wccp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the wccp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_wccp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_wccp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_wccp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the wccp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_wccp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_wccp_port'($*)) dnl
-
- gen_require(`
- type wccp_port_t;
- ')
-
- allow $1 wccp_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_wccp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the wccp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_wccp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_wccp_port'($*)) dnl
-
- gen_require(`
- type wccp_port_t;
- ')
-
- allow $1 wccp_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_wccp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the wccp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_wccp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_wccp_port'($*)) dnl
-
- gen_require(`
- type wccp_port_t;
- ')
-
- allow $1 wccp_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_wccp_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send wccp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_wccp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_wccp_client_packets'($*)) dnl
-
- gen_require(`
- type wccp_client_packet_t;
- ')
-
- allow $1 wccp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_wccp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send wccp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_wccp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_wccp_client_packets'($*)) dnl
-
- gen_require(`
- type wccp_client_packet_t;
- ')
-
- dontaudit $1 wccp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_wccp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive wccp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_wccp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_wccp_client_packets'($*)) dnl
-
- gen_require(`
- type wccp_client_packet_t;
- ')
-
- allow $1 wccp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_wccp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive wccp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_wccp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_wccp_client_packets'($*)) dnl
-
- gen_require(`
- type wccp_client_packet_t;
- ')
-
- dontaudit $1 wccp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_wccp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive wccp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_wccp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_wccp_client_packets'($*)) dnl
-
- corenet_send_wccp_client_packets($1)
- corenet_receive_wccp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_wccp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive wccp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_wccp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_wccp_client_packets'($*)) dnl
-
- corenet_dontaudit_send_wccp_client_packets($1)
- corenet_dontaudit_receive_wccp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_wccp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to wccp_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_wccp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_wccp_client_packets'($*)) dnl
-
- gen_require(`
- type wccp_client_packet_t;
- ')
-
- allow $1 wccp_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_wccp_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send wccp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_wccp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_wccp_server_packets'($*)) dnl
-
- gen_require(`
- type wccp_server_packet_t;
- ')
-
- allow $1 wccp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_wccp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send wccp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_wccp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_wccp_server_packets'($*)) dnl
-
- gen_require(`
- type wccp_server_packet_t;
- ')
-
- dontaudit $1 wccp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_wccp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive wccp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_wccp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_wccp_server_packets'($*)) dnl
-
- gen_require(`
- type wccp_server_packet_t;
- ')
-
- allow $1 wccp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_wccp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive wccp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_wccp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_wccp_server_packets'($*)) dnl
-
- gen_require(`
- type wccp_server_packet_t;
- ')
-
- dontaudit $1 wccp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_wccp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive wccp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_wccp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_wccp_server_packets'($*)) dnl
-
- corenet_send_wccp_server_packets($1)
- corenet_receive_wccp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_wccp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive wccp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_wccp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_wccp_server_packets'($*)) dnl
-
- corenet_dontaudit_send_wccp_server_packets($1)
- corenet_dontaudit_receive_wccp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_wccp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to wccp_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_wccp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_wccp_server_packets'($*)) dnl
-
- gen_require(`
- type wccp_server_packet_t;
- ')
-
- allow $1 wccp_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_wccp_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the websm port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_websm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_websm_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_websm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the websm port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_websm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_websm_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_websm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the websm port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_websm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_websm_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_websm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the websm port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_websm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_websm_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_websm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the websm port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_websm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_websm_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_websm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the websm port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_websm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_websm_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_websm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the websm port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_websm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_websm_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_websm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the websm port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_websm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_websm_port'($*)) dnl
-
- gen_require(`
- type websm_port_t;
- ')
-
- allow $1 websm_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_websm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the websm port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_websm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_websm_port'($*)) dnl
-
- gen_require(`
- type websm_port_t;
- ')
-
- allow $1 websm_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_websm_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the websm port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_websm_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_websm_port'($*)) dnl
-
- gen_require(`
- type websm_port_t;
- ')
-
- allow $1 websm_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_websm_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send websm_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_websm_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_websm_client_packets'($*)) dnl
-
- gen_require(`
- type websm_client_packet_t;
- ')
-
- allow $1 websm_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_websm_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send websm_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_websm_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_websm_client_packets'($*)) dnl
-
- gen_require(`
- type websm_client_packet_t;
- ')
-
- dontaudit $1 websm_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_websm_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive websm_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_websm_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_websm_client_packets'($*)) dnl
-
- gen_require(`
- type websm_client_packet_t;
- ')
-
- allow $1 websm_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_websm_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive websm_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_websm_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_websm_client_packets'($*)) dnl
-
- gen_require(`
- type websm_client_packet_t;
- ')
-
- dontaudit $1 websm_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_websm_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive websm_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_websm_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_websm_client_packets'($*)) dnl
-
- corenet_send_websm_client_packets($1)
- corenet_receive_websm_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_websm_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive websm_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_websm_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_websm_client_packets'($*)) dnl
-
- corenet_dontaudit_send_websm_client_packets($1)
- corenet_dontaudit_receive_websm_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_websm_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to websm_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_websm_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_websm_client_packets'($*)) dnl
-
- gen_require(`
- type websm_client_packet_t;
- ')
-
- allow $1 websm_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_websm_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send websm_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_websm_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_websm_server_packets'($*)) dnl
-
- gen_require(`
- type websm_server_packet_t;
- ')
-
- allow $1 websm_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_websm_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send websm_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_websm_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_websm_server_packets'($*)) dnl
-
- gen_require(`
- type websm_server_packet_t;
- ')
-
- dontaudit $1 websm_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_websm_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive websm_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_websm_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_websm_server_packets'($*)) dnl
-
- gen_require(`
- type websm_server_packet_t;
- ')
-
- allow $1 websm_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_websm_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive websm_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_websm_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_websm_server_packets'($*)) dnl
-
- gen_require(`
- type websm_server_packet_t;
- ')
-
- dontaudit $1 websm_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_websm_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive websm_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_websm_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_websm_server_packets'($*)) dnl
-
- corenet_send_websm_server_packets($1)
- corenet_receive_websm_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_websm_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive websm_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_websm_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_websm_server_packets'($*)) dnl
-
- corenet_dontaudit_send_websm_server_packets($1)
- corenet_dontaudit_receive_websm_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_websm_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to websm_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_websm_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_websm_server_packets'($*)) dnl
-
- gen_require(`
- type websm_server_packet_t;
- ')
-
- allow $1 websm_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_websm_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the whois port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_whois_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_whois_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_whois_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the whois port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_whois_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_whois_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_whois_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the whois port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_whois_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_whois_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_whois_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the whois port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_whois_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_whois_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_whois_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the whois port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_whois_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_whois_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_whois_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the whois port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_whois_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_whois_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_whois_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the whois port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_whois_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_whois_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_whois_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the whois port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_whois_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_whois_port'($*)) dnl
-
- gen_require(`
- type whois_port_t;
- ')
-
- allow $1 whois_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_whois_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the whois port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_whois_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_whois_port'($*)) dnl
-
- gen_require(`
- type whois_port_t;
- ')
-
- allow $1 whois_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_whois_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the whois port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_whois_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_whois_port'($*)) dnl
-
- gen_require(`
- type whois_port_t;
- ')
-
- allow $1 whois_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_whois_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send whois_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_whois_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_whois_client_packets'($*)) dnl
-
- gen_require(`
- type whois_client_packet_t;
- ')
-
- allow $1 whois_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_whois_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send whois_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_whois_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_whois_client_packets'($*)) dnl
-
- gen_require(`
- type whois_client_packet_t;
- ')
-
- dontaudit $1 whois_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_whois_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive whois_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_whois_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_whois_client_packets'($*)) dnl
-
- gen_require(`
- type whois_client_packet_t;
- ')
-
- allow $1 whois_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_whois_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive whois_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_whois_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_whois_client_packets'($*)) dnl
-
- gen_require(`
- type whois_client_packet_t;
- ')
-
- dontaudit $1 whois_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_whois_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive whois_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_whois_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_whois_client_packets'($*)) dnl
-
- corenet_send_whois_client_packets($1)
- corenet_receive_whois_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_whois_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive whois_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_whois_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_whois_client_packets'($*)) dnl
-
- corenet_dontaudit_send_whois_client_packets($1)
- corenet_dontaudit_receive_whois_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_whois_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to whois_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_whois_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_whois_client_packets'($*)) dnl
-
- gen_require(`
- type whois_client_packet_t;
- ')
-
- allow $1 whois_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_whois_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send whois_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_whois_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_whois_server_packets'($*)) dnl
-
- gen_require(`
- type whois_server_packet_t;
- ')
-
- allow $1 whois_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_whois_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send whois_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_whois_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_whois_server_packets'($*)) dnl
-
- gen_require(`
- type whois_server_packet_t;
- ')
-
- dontaudit $1 whois_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_whois_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive whois_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_whois_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_whois_server_packets'($*)) dnl
-
- gen_require(`
- type whois_server_packet_t;
- ')
-
- allow $1 whois_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_whois_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive whois_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_whois_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_whois_server_packets'($*)) dnl
-
- gen_require(`
- type whois_server_packet_t;
- ')
-
- dontaudit $1 whois_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_whois_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive whois_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_whois_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_whois_server_packets'($*)) dnl
-
- corenet_send_whois_server_packets($1)
- corenet_receive_whois_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_whois_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive whois_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_whois_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_whois_server_packets'($*)) dnl
-
- corenet_dontaudit_send_whois_server_packets($1)
- corenet_dontaudit_receive_whois_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_whois_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to whois_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_whois_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_whois_server_packets'($*)) dnl
-
- gen_require(`
- type whois_server_packet_t;
- ')
-
- allow $1 whois_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_whois_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the winshadow port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_winshadow_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_winshadow_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_winshadow_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the winshadow port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_winshadow_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_winshadow_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_winshadow_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the winshadow port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_winshadow_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_winshadow_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_winshadow_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the winshadow port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_winshadow_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_winshadow_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_winshadow_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the winshadow port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_winshadow_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_winshadow_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_winshadow_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the winshadow port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_winshadow_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_winshadow_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_winshadow_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the winshadow port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_winshadow_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_winshadow_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_winshadow_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the winshadow port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_winshadow_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_winshadow_port'($*)) dnl
-
- gen_require(`
- type winshadow_port_t;
- ')
-
- allow $1 winshadow_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_winshadow_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the winshadow port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_winshadow_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_winshadow_port'($*)) dnl
-
- gen_require(`
- type winshadow_port_t;
- ')
-
- allow $1 winshadow_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_winshadow_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the winshadow port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_winshadow_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_winshadow_port'($*)) dnl
-
- gen_require(`
- type winshadow_port_t;
- ')
-
- allow $1 winshadow_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_winshadow_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send winshadow_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_winshadow_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_winshadow_client_packets'($*)) dnl
-
- gen_require(`
- type winshadow_client_packet_t;
- ')
-
- allow $1 winshadow_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_winshadow_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send winshadow_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_winshadow_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_winshadow_client_packets'($*)) dnl
-
- gen_require(`
- type winshadow_client_packet_t;
- ')
-
- dontaudit $1 winshadow_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_winshadow_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive winshadow_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_winshadow_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_winshadow_client_packets'($*)) dnl
-
- gen_require(`
- type winshadow_client_packet_t;
- ')
-
- allow $1 winshadow_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_winshadow_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive winshadow_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_winshadow_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_winshadow_client_packets'($*)) dnl
-
- gen_require(`
- type winshadow_client_packet_t;
- ')
-
- dontaudit $1 winshadow_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_winshadow_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive winshadow_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_winshadow_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_winshadow_client_packets'($*)) dnl
-
- corenet_send_winshadow_client_packets($1)
- corenet_receive_winshadow_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_winshadow_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive winshadow_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_winshadow_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_winshadow_client_packets'($*)) dnl
-
- corenet_dontaudit_send_winshadow_client_packets($1)
- corenet_dontaudit_receive_winshadow_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_winshadow_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to winshadow_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_winshadow_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_winshadow_client_packets'($*)) dnl
-
- gen_require(`
- type winshadow_client_packet_t;
- ')
-
- allow $1 winshadow_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_winshadow_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send winshadow_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_winshadow_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_winshadow_server_packets'($*)) dnl
-
- gen_require(`
- type winshadow_server_packet_t;
- ')
-
- allow $1 winshadow_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_winshadow_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send winshadow_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_winshadow_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_winshadow_server_packets'($*)) dnl
-
- gen_require(`
- type winshadow_server_packet_t;
- ')
-
- dontaudit $1 winshadow_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_winshadow_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive winshadow_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_winshadow_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_winshadow_server_packets'($*)) dnl
-
- gen_require(`
- type winshadow_server_packet_t;
- ')
-
- allow $1 winshadow_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_winshadow_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive winshadow_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_winshadow_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_winshadow_server_packets'($*)) dnl
-
- gen_require(`
- type winshadow_server_packet_t;
- ')
-
- dontaudit $1 winshadow_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_winshadow_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive winshadow_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_winshadow_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_winshadow_server_packets'($*)) dnl
-
- corenet_send_winshadow_server_packets($1)
- corenet_receive_winshadow_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_winshadow_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive winshadow_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_winshadow_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_winshadow_server_packets'($*)) dnl
-
- corenet_dontaudit_send_winshadow_server_packets($1)
- corenet_dontaudit_receive_winshadow_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_winshadow_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to winshadow_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_winshadow_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_winshadow_server_packets'($*)) dnl
-
- gen_require(`
- type winshadow_server_packet_t;
- ')
-
- allow $1 winshadow_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_winshadow_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the wsdapi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_wsdapi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_wsdapi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_wsdapi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the wsdapi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_wsdapi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_wsdapi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_wsdapi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the wsdapi port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_wsdapi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_wsdapi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_wsdapi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the wsdapi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_wsdapi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_wsdapi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_wsdapi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the wsdapi port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_wsdapi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_wsdapi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_wsdapi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the wsdapi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_wsdapi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_wsdapi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_wsdapi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the wsdapi port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_wsdapi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_wsdapi_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_wsdapi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the wsdapi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_wsdapi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_wsdapi_port'($*)) dnl
-
- gen_require(`
- type wsdapi_port_t;
- ')
-
- allow $1 wsdapi_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_wsdapi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the wsdapi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_wsdapi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_wsdapi_port'($*)) dnl
-
- gen_require(`
- type wsdapi_port_t;
- ')
-
- allow $1 wsdapi_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_wsdapi_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the wsdapi port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_wsdapi_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_wsdapi_port'($*)) dnl
-
- gen_require(`
- type wsdapi_port_t;
- ')
-
- allow $1 wsdapi_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_wsdapi_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send wsdapi_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_wsdapi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_wsdapi_client_packets'($*)) dnl
-
- gen_require(`
- type wsdapi_client_packet_t;
- ')
-
- allow $1 wsdapi_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_wsdapi_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send wsdapi_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_wsdapi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_wsdapi_client_packets'($*)) dnl
-
- gen_require(`
- type wsdapi_client_packet_t;
- ')
-
- dontaudit $1 wsdapi_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_wsdapi_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive wsdapi_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_wsdapi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_wsdapi_client_packets'($*)) dnl
-
- gen_require(`
- type wsdapi_client_packet_t;
- ')
-
- allow $1 wsdapi_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_wsdapi_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive wsdapi_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_wsdapi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_wsdapi_client_packets'($*)) dnl
-
- gen_require(`
- type wsdapi_client_packet_t;
- ')
-
- dontaudit $1 wsdapi_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_wsdapi_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive wsdapi_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_wsdapi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_wsdapi_client_packets'($*)) dnl
-
- corenet_send_wsdapi_client_packets($1)
- corenet_receive_wsdapi_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_wsdapi_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive wsdapi_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_wsdapi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_wsdapi_client_packets'($*)) dnl
-
- corenet_dontaudit_send_wsdapi_client_packets($1)
- corenet_dontaudit_receive_wsdapi_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_wsdapi_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to wsdapi_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_wsdapi_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_wsdapi_client_packets'($*)) dnl
-
- gen_require(`
- type wsdapi_client_packet_t;
- ')
-
- allow $1 wsdapi_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_wsdapi_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send wsdapi_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_wsdapi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_wsdapi_server_packets'($*)) dnl
-
- gen_require(`
- type wsdapi_server_packet_t;
- ')
-
- allow $1 wsdapi_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_wsdapi_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send wsdapi_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_wsdapi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_wsdapi_server_packets'($*)) dnl
-
- gen_require(`
- type wsdapi_server_packet_t;
- ')
-
- dontaudit $1 wsdapi_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_wsdapi_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive wsdapi_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_wsdapi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_wsdapi_server_packets'($*)) dnl
-
- gen_require(`
- type wsdapi_server_packet_t;
- ')
-
- allow $1 wsdapi_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_wsdapi_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive wsdapi_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_wsdapi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_wsdapi_server_packets'($*)) dnl
-
- gen_require(`
- type wsdapi_server_packet_t;
- ')
-
- dontaudit $1 wsdapi_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_wsdapi_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive wsdapi_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_wsdapi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_wsdapi_server_packets'($*)) dnl
-
- corenet_send_wsdapi_server_packets($1)
- corenet_receive_wsdapi_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_wsdapi_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive wsdapi_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_wsdapi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_wsdapi_server_packets'($*)) dnl
-
- corenet_dontaudit_send_wsdapi_server_packets($1)
- corenet_dontaudit_receive_wsdapi_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_wsdapi_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to wsdapi_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_wsdapi_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_wsdapi_server_packets'($*)) dnl
-
- gen_require(`
- type wsdapi_server_packet_t;
- ')
-
- allow $1 wsdapi_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_wsdapi_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the wsicopy port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_wsicopy_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_wsicopy_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_wsicopy_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the wsicopy port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_wsicopy_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_wsicopy_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_wsicopy_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the wsicopy port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_wsicopy_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_wsicopy_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_wsicopy_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the wsicopy port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_wsicopy_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_wsicopy_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_wsicopy_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the wsicopy port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_wsicopy_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_wsicopy_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_wsicopy_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the wsicopy port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_wsicopy_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_wsicopy_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_wsicopy_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the wsicopy port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_wsicopy_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_wsicopy_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_wsicopy_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the wsicopy port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_wsicopy_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_wsicopy_port'($*)) dnl
-
- gen_require(`
- type wsicopy_port_t;
- ')
-
- allow $1 wsicopy_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_wsicopy_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the wsicopy port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_wsicopy_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_wsicopy_port'($*)) dnl
-
- gen_require(`
- type wsicopy_port_t;
- ')
-
- allow $1 wsicopy_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_wsicopy_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the wsicopy port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_wsicopy_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_wsicopy_port'($*)) dnl
-
- gen_require(`
- type wsicopy_port_t;
- ')
-
- allow $1 wsicopy_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_wsicopy_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send wsicopy_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_wsicopy_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_wsicopy_client_packets'($*)) dnl
-
- gen_require(`
- type wsicopy_client_packet_t;
- ')
-
- allow $1 wsicopy_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_wsicopy_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send wsicopy_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_wsicopy_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_wsicopy_client_packets'($*)) dnl
-
- gen_require(`
- type wsicopy_client_packet_t;
- ')
-
- dontaudit $1 wsicopy_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_wsicopy_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive wsicopy_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_wsicopy_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_wsicopy_client_packets'($*)) dnl
-
- gen_require(`
- type wsicopy_client_packet_t;
- ')
-
- allow $1 wsicopy_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_wsicopy_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive wsicopy_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_wsicopy_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_wsicopy_client_packets'($*)) dnl
-
- gen_require(`
- type wsicopy_client_packet_t;
- ')
-
- dontaudit $1 wsicopy_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_wsicopy_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive wsicopy_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_wsicopy_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_wsicopy_client_packets'($*)) dnl
-
- corenet_send_wsicopy_client_packets($1)
- corenet_receive_wsicopy_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_wsicopy_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive wsicopy_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_wsicopy_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_wsicopy_client_packets'($*)) dnl
-
- corenet_dontaudit_send_wsicopy_client_packets($1)
- corenet_dontaudit_receive_wsicopy_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_wsicopy_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to wsicopy_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_wsicopy_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_wsicopy_client_packets'($*)) dnl
-
- gen_require(`
- type wsicopy_client_packet_t;
- ')
-
- allow $1 wsicopy_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_wsicopy_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send wsicopy_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_wsicopy_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_wsicopy_server_packets'($*)) dnl
-
- gen_require(`
- type wsicopy_server_packet_t;
- ')
-
- allow $1 wsicopy_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_wsicopy_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send wsicopy_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_wsicopy_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_wsicopy_server_packets'($*)) dnl
-
- gen_require(`
- type wsicopy_server_packet_t;
- ')
-
- dontaudit $1 wsicopy_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_wsicopy_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive wsicopy_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_wsicopy_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_wsicopy_server_packets'($*)) dnl
-
- gen_require(`
- type wsicopy_server_packet_t;
- ')
-
- allow $1 wsicopy_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_wsicopy_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive wsicopy_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_wsicopy_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_wsicopy_server_packets'($*)) dnl
-
- gen_require(`
- type wsicopy_server_packet_t;
- ')
-
- dontaudit $1 wsicopy_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_wsicopy_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive wsicopy_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_wsicopy_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_wsicopy_server_packets'($*)) dnl
-
- corenet_send_wsicopy_server_packets($1)
- corenet_receive_wsicopy_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_wsicopy_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive wsicopy_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_wsicopy_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_wsicopy_server_packets'($*)) dnl
-
- corenet_dontaudit_send_wsicopy_server_packets($1)
- corenet_dontaudit_receive_wsicopy_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_wsicopy_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to wsicopy_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_wsicopy_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_wsicopy_server_packets'($*)) dnl
-
- gen_require(`
- type wsicopy_server_packet_t;
- ')
-
- allow $1 wsicopy_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_wsicopy_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the xdmcp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_xdmcp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_xdmcp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_xdmcp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the xdmcp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_xdmcp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_xdmcp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_xdmcp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the xdmcp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_xdmcp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_xdmcp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_xdmcp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the xdmcp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_xdmcp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_xdmcp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_xdmcp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the xdmcp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_xdmcp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_xdmcp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_xdmcp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the xdmcp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_xdmcp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_xdmcp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_xdmcp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the xdmcp port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_xdmcp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_xdmcp_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_xdmcp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the xdmcp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_xdmcp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_xdmcp_port'($*)) dnl
-
- gen_require(`
- type xdmcp_port_t;
- ')
-
- allow $1 xdmcp_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_xdmcp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the xdmcp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_xdmcp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_xdmcp_port'($*)) dnl
-
- gen_require(`
- type xdmcp_port_t;
- ')
-
- allow $1 xdmcp_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_xdmcp_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the xdmcp port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_xdmcp_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_xdmcp_port'($*)) dnl
-
- gen_require(`
- type xdmcp_port_t;
- ')
-
- allow $1 xdmcp_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_xdmcp_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send xdmcp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_xdmcp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_xdmcp_client_packets'($*)) dnl
-
- gen_require(`
- type xdmcp_client_packet_t;
- ')
-
- allow $1 xdmcp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_xdmcp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send xdmcp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_xdmcp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_xdmcp_client_packets'($*)) dnl
-
- gen_require(`
- type xdmcp_client_packet_t;
- ')
-
- dontaudit $1 xdmcp_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_xdmcp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive xdmcp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_xdmcp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_xdmcp_client_packets'($*)) dnl
-
- gen_require(`
- type xdmcp_client_packet_t;
- ')
-
- allow $1 xdmcp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_xdmcp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive xdmcp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_xdmcp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_xdmcp_client_packets'($*)) dnl
-
- gen_require(`
- type xdmcp_client_packet_t;
- ')
-
- dontaudit $1 xdmcp_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_xdmcp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive xdmcp_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_xdmcp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_xdmcp_client_packets'($*)) dnl
-
- corenet_send_xdmcp_client_packets($1)
- corenet_receive_xdmcp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_xdmcp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive xdmcp_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_xdmcp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_xdmcp_client_packets'($*)) dnl
-
- corenet_dontaudit_send_xdmcp_client_packets($1)
- corenet_dontaudit_receive_xdmcp_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_xdmcp_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to xdmcp_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_xdmcp_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_xdmcp_client_packets'($*)) dnl
-
- gen_require(`
- type xdmcp_client_packet_t;
- ')
-
- allow $1 xdmcp_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_xdmcp_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send xdmcp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_xdmcp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_xdmcp_server_packets'($*)) dnl
-
- gen_require(`
- type xdmcp_server_packet_t;
- ')
-
- allow $1 xdmcp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_xdmcp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send xdmcp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_xdmcp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_xdmcp_server_packets'($*)) dnl
-
- gen_require(`
- type xdmcp_server_packet_t;
- ')
-
- dontaudit $1 xdmcp_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_xdmcp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive xdmcp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_xdmcp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_xdmcp_server_packets'($*)) dnl
-
- gen_require(`
- type xdmcp_server_packet_t;
- ')
-
- allow $1 xdmcp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_xdmcp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive xdmcp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_xdmcp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_xdmcp_server_packets'($*)) dnl
-
- gen_require(`
- type xdmcp_server_packet_t;
- ')
-
- dontaudit $1 xdmcp_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_xdmcp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive xdmcp_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_xdmcp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_xdmcp_server_packets'($*)) dnl
-
- corenet_send_xdmcp_server_packets($1)
- corenet_receive_xdmcp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_xdmcp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive xdmcp_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_xdmcp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_xdmcp_server_packets'($*)) dnl
-
- corenet_dontaudit_send_xdmcp_server_packets($1)
- corenet_dontaudit_receive_xdmcp_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_xdmcp_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to xdmcp_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_xdmcp_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_xdmcp_server_packets'($*)) dnl
-
- gen_require(`
- type xdmcp_server_packet_t;
- ')
-
- allow $1 xdmcp_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_xdmcp_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the xen port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_xen_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_xen_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_xen_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the xen port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_xen_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_xen_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_xen_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the xen port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_xen_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_xen_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_xen_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the xen port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_xen_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_xen_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_xen_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the xen port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_xen_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_xen_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_xen_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the xen port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_xen_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_xen_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_xen_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the xen port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_xen_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_xen_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_xen_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the xen port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_xen_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_xen_port'($*)) dnl
-
- gen_require(`
- type xen_port_t;
- ')
-
- allow $1 xen_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_xen_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the xen port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_xen_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_xen_port'($*)) dnl
-
- gen_require(`
- type xen_port_t;
- ')
-
- allow $1 xen_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_xen_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the xen port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_xen_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_xen_port'($*)) dnl
-
- gen_require(`
- type xen_port_t;
- ')
-
- allow $1 xen_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_xen_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send xen_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_xen_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_xen_client_packets'($*)) dnl
-
- gen_require(`
- type xen_client_packet_t;
- ')
-
- allow $1 xen_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_xen_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send xen_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_xen_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_xen_client_packets'($*)) dnl
-
- gen_require(`
- type xen_client_packet_t;
- ')
-
- dontaudit $1 xen_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_xen_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive xen_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_xen_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_xen_client_packets'($*)) dnl
-
- gen_require(`
- type xen_client_packet_t;
- ')
-
- allow $1 xen_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_xen_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive xen_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_xen_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_xen_client_packets'($*)) dnl
-
- gen_require(`
- type xen_client_packet_t;
- ')
-
- dontaudit $1 xen_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_xen_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive xen_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_xen_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_xen_client_packets'($*)) dnl
-
- corenet_send_xen_client_packets($1)
- corenet_receive_xen_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_xen_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive xen_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_xen_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_xen_client_packets'($*)) dnl
-
- corenet_dontaudit_send_xen_client_packets($1)
- corenet_dontaudit_receive_xen_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_xen_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to xen_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_xen_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_xen_client_packets'($*)) dnl
-
- gen_require(`
- type xen_client_packet_t;
- ')
-
- allow $1 xen_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_xen_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send xen_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_xen_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_xen_server_packets'($*)) dnl
-
- gen_require(`
- type xen_server_packet_t;
- ')
-
- allow $1 xen_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_xen_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send xen_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_xen_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_xen_server_packets'($*)) dnl
-
- gen_require(`
- type xen_server_packet_t;
- ')
-
- dontaudit $1 xen_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_xen_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive xen_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_xen_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_xen_server_packets'($*)) dnl
-
- gen_require(`
- type xen_server_packet_t;
- ')
-
- allow $1 xen_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_xen_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive xen_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_xen_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_xen_server_packets'($*)) dnl
-
- gen_require(`
- type xen_server_packet_t;
- ')
-
- dontaudit $1 xen_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_xen_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive xen_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_xen_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_xen_server_packets'($*)) dnl
-
- corenet_send_xen_server_packets($1)
- corenet_receive_xen_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_xen_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive xen_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_xen_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_xen_server_packets'($*)) dnl
-
- corenet_dontaudit_send_xen_server_packets($1)
- corenet_dontaudit_receive_xen_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_xen_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to xen_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_xen_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_xen_server_packets'($*)) dnl
-
- gen_require(`
- type xen_server_packet_t;
- ')
-
- allow $1 xen_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_xen_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the xfs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_xfs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_xfs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_xfs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the xfs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_xfs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_xfs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_xfs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the xfs port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_xfs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_xfs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_xfs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the xfs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_xfs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_xfs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_xfs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the xfs port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_xfs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_xfs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_xfs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the xfs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_xfs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_xfs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_xfs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the xfs port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_xfs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_xfs_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_xfs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the xfs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_xfs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_xfs_port'($*)) dnl
-
- gen_require(`
- type xfs_port_t;
- ')
-
- allow $1 xfs_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_xfs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the xfs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_xfs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_xfs_port'($*)) dnl
-
- gen_require(`
- type xfs_port_t;
- ')
-
- allow $1 xfs_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_xfs_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the xfs port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_xfs_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_xfs_port'($*)) dnl
-
- gen_require(`
- type xfs_port_t;
- ')
-
- allow $1 xfs_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_xfs_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send xfs_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_xfs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_xfs_client_packets'($*)) dnl
-
- gen_require(`
- type xfs_client_packet_t;
- ')
-
- allow $1 xfs_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_xfs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send xfs_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_xfs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_xfs_client_packets'($*)) dnl
-
- gen_require(`
- type xfs_client_packet_t;
- ')
-
- dontaudit $1 xfs_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_xfs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive xfs_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_xfs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_xfs_client_packets'($*)) dnl
-
- gen_require(`
- type xfs_client_packet_t;
- ')
-
- allow $1 xfs_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_xfs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive xfs_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_xfs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_xfs_client_packets'($*)) dnl
-
- gen_require(`
- type xfs_client_packet_t;
- ')
-
- dontaudit $1 xfs_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_xfs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive xfs_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_xfs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_xfs_client_packets'($*)) dnl
-
- corenet_send_xfs_client_packets($1)
- corenet_receive_xfs_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_xfs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive xfs_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_xfs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_xfs_client_packets'($*)) dnl
-
- corenet_dontaudit_send_xfs_client_packets($1)
- corenet_dontaudit_receive_xfs_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_xfs_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to xfs_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_xfs_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_xfs_client_packets'($*)) dnl
-
- gen_require(`
- type xfs_client_packet_t;
- ')
-
- allow $1 xfs_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_xfs_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send xfs_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_xfs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_xfs_server_packets'($*)) dnl
-
- gen_require(`
- type xfs_server_packet_t;
- ')
-
- allow $1 xfs_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_xfs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send xfs_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_xfs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_xfs_server_packets'($*)) dnl
-
- gen_require(`
- type xfs_server_packet_t;
- ')
-
- dontaudit $1 xfs_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_xfs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive xfs_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_xfs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_xfs_server_packets'($*)) dnl
-
- gen_require(`
- type xfs_server_packet_t;
- ')
-
- allow $1 xfs_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_xfs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive xfs_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_xfs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_xfs_server_packets'($*)) dnl
-
- gen_require(`
- type xfs_server_packet_t;
- ')
-
- dontaudit $1 xfs_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_xfs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive xfs_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_xfs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_xfs_server_packets'($*)) dnl
-
- corenet_send_xfs_server_packets($1)
- corenet_receive_xfs_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_xfs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive xfs_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_xfs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_xfs_server_packets'($*)) dnl
-
- corenet_dontaudit_send_xfs_server_packets($1)
- corenet_dontaudit_receive_xfs_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_xfs_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to xfs_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_xfs_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_xfs_server_packets'($*)) dnl
-
- gen_require(`
- type xfs_server_packet_t;
- ')
-
- allow $1 xfs_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_xfs_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the xserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_xserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_xserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_xserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the xserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_xserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_xserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_xserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the xserver port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_xserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_xserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_xserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the xserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_xserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_xserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_xserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the xserver port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_xserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_xserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_xserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the xserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_xserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_xserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_xserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the xserver port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_xserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_xserver_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_xserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the xserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_xserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_xserver_port'($*)) dnl
-
- gen_require(`
- type xserver_port_t;
- ')
-
- allow $1 xserver_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_xserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the xserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_xserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_xserver_port'($*)) dnl
-
- gen_require(`
- type xserver_port_t;
- ')
-
- allow $1 xserver_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_xserver_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the xserver port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_xserver_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_xserver_port'($*)) dnl
-
- gen_require(`
- type xserver_port_t;
- ')
-
- allow $1 xserver_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_xserver_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send xserver_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_xserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_xserver_client_packets'($*)) dnl
-
- gen_require(`
- type xserver_client_packet_t;
- ')
-
- allow $1 xserver_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_xserver_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send xserver_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_xserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_xserver_client_packets'($*)) dnl
-
- gen_require(`
- type xserver_client_packet_t;
- ')
-
- dontaudit $1 xserver_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_xserver_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive xserver_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_xserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_xserver_client_packets'($*)) dnl
-
- gen_require(`
- type xserver_client_packet_t;
- ')
-
- allow $1 xserver_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_xserver_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive xserver_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_xserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_xserver_client_packets'($*)) dnl
-
- gen_require(`
- type xserver_client_packet_t;
- ')
-
- dontaudit $1 xserver_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_xserver_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive xserver_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_xserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_xserver_client_packets'($*)) dnl
-
- corenet_send_xserver_client_packets($1)
- corenet_receive_xserver_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_xserver_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive xserver_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_xserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_xserver_client_packets'($*)) dnl
-
- corenet_dontaudit_send_xserver_client_packets($1)
- corenet_dontaudit_receive_xserver_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_xserver_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to xserver_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_xserver_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_xserver_client_packets'($*)) dnl
-
- gen_require(`
- type xserver_client_packet_t;
- ')
-
- allow $1 xserver_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_xserver_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send xserver_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_xserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_xserver_server_packets'($*)) dnl
-
- gen_require(`
- type xserver_server_packet_t;
- ')
-
- allow $1 xserver_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_xserver_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send xserver_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_xserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_xserver_server_packets'($*)) dnl
-
- gen_require(`
- type xserver_server_packet_t;
- ')
-
- dontaudit $1 xserver_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_xserver_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive xserver_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_xserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_xserver_server_packets'($*)) dnl
-
- gen_require(`
- type xserver_server_packet_t;
- ')
-
- allow $1 xserver_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_xserver_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive xserver_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_xserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_xserver_server_packets'($*)) dnl
-
- gen_require(`
- type xserver_server_packet_t;
- ')
-
- dontaudit $1 xserver_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_xserver_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive xserver_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_xserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_xserver_server_packets'($*)) dnl
-
- corenet_send_xserver_server_packets($1)
- corenet_receive_xserver_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_xserver_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive xserver_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_xserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_xserver_server_packets'($*)) dnl
-
- corenet_dontaudit_send_xserver_server_packets($1)
- corenet_dontaudit_receive_xserver_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_xserver_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to xserver_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_xserver_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_xserver_server_packets'($*)) dnl
-
- gen_require(`
- type xserver_server_packet_t;
- ')
-
- allow $1 xserver_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_xserver_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the zarafa port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_zarafa_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_zarafa_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_zarafa_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the zarafa port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_zarafa_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_zarafa_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_zarafa_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the zarafa port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_zarafa_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_zarafa_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_zarafa_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the zarafa port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_zarafa_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_zarafa_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_zarafa_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the zarafa port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_zarafa_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_zarafa_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_zarafa_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the zarafa port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_zarafa_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_zarafa_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_zarafa_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the zarafa port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_zarafa_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_zarafa_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_zarafa_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the zarafa port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_zarafa_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_zarafa_port'($*)) dnl
-
- gen_require(`
- type zarafa_port_t;
- ')
-
- allow $1 zarafa_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_zarafa_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the zarafa port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_zarafa_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_zarafa_port'($*)) dnl
-
- gen_require(`
- type zarafa_port_t;
- ')
-
- allow $1 zarafa_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_zarafa_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the zarafa port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_zarafa_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_zarafa_port'($*)) dnl
-
- gen_require(`
- type zarafa_port_t;
- ')
-
- allow $1 zarafa_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_zarafa_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send zarafa_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_zarafa_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_zarafa_client_packets'($*)) dnl
-
- gen_require(`
- type zarafa_client_packet_t;
- ')
-
- allow $1 zarafa_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_zarafa_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send zarafa_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_zarafa_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zarafa_client_packets'($*)) dnl
-
- gen_require(`
- type zarafa_client_packet_t;
- ')
-
- dontaudit $1 zarafa_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zarafa_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive zarafa_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_zarafa_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_zarafa_client_packets'($*)) dnl
-
- gen_require(`
- type zarafa_client_packet_t;
- ')
-
- allow $1 zarafa_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_zarafa_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive zarafa_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_zarafa_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zarafa_client_packets'($*)) dnl
-
- gen_require(`
- type zarafa_client_packet_t;
- ')
-
- dontaudit $1 zarafa_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zarafa_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive zarafa_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_zarafa_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zarafa_client_packets'($*)) dnl
-
- corenet_send_zarafa_client_packets($1)
- corenet_receive_zarafa_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zarafa_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive zarafa_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_zarafa_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zarafa_client_packets'($*)) dnl
-
- corenet_dontaudit_send_zarafa_client_packets($1)
- corenet_dontaudit_receive_zarafa_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zarafa_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to zarafa_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_zarafa_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zarafa_client_packets'($*)) dnl
-
- gen_require(`
- type zarafa_client_packet_t;
- ')
-
- allow $1 zarafa_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_zarafa_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send zarafa_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_zarafa_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_zarafa_server_packets'($*)) dnl
-
- gen_require(`
- type zarafa_server_packet_t;
- ')
-
- allow $1 zarafa_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_zarafa_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send zarafa_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_zarafa_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zarafa_server_packets'($*)) dnl
-
- gen_require(`
- type zarafa_server_packet_t;
- ')
-
- dontaudit $1 zarafa_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zarafa_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive zarafa_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_zarafa_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_zarafa_server_packets'($*)) dnl
-
- gen_require(`
- type zarafa_server_packet_t;
- ')
-
- allow $1 zarafa_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_zarafa_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive zarafa_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_zarafa_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zarafa_server_packets'($*)) dnl
-
- gen_require(`
- type zarafa_server_packet_t;
- ')
-
- dontaudit $1 zarafa_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zarafa_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive zarafa_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_zarafa_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zarafa_server_packets'($*)) dnl
-
- corenet_send_zarafa_server_packets($1)
- corenet_receive_zarafa_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zarafa_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive zarafa_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_zarafa_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zarafa_server_packets'($*)) dnl
-
- corenet_dontaudit_send_zarafa_server_packets($1)
- corenet_dontaudit_receive_zarafa_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zarafa_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to zarafa_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_zarafa_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zarafa_server_packets'($*)) dnl
-
- gen_require(`
- type zarafa_server_packet_t;
- ')
-
- allow $1 zarafa_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_zarafa_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the zabbix port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_zabbix_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_zabbix_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_zabbix_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the zabbix port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_zabbix_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_zabbix_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_zabbix_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the zabbix port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_zabbix_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_zabbix_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_zabbix_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the zabbix port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_zabbix_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_zabbix_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_zabbix_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the zabbix port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_zabbix_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_zabbix_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_zabbix_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the zabbix port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_zabbix_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_zabbix_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_zabbix_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the zabbix port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_zabbix_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_zabbix_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_zabbix_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the zabbix port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_zabbix_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_zabbix_port'($*)) dnl
-
- gen_require(`
- type zabbix_port_t;
- ')
-
- allow $1 zabbix_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_zabbix_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the zabbix port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_zabbix_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_zabbix_port'($*)) dnl
-
- gen_require(`
- type zabbix_port_t;
- ')
-
- allow $1 zabbix_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_zabbix_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the zabbix port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_zabbix_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_zabbix_port'($*)) dnl
-
- gen_require(`
- type zabbix_port_t;
- ')
-
- allow $1 zabbix_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_zabbix_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send zabbix_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_zabbix_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_zabbix_client_packets'($*)) dnl
-
- gen_require(`
- type zabbix_client_packet_t;
- ')
-
- allow $1 zabbix_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_zabbix_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send zabbix_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_zabbix_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zabbix_client_packets'($*)) dnl
-
- gen_require(`
- type zabbix_client_packet_t;
- ')
-
- dontaudit $1 zabbix_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zabbix_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive zabbix_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_zabbix_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_zabbix_client_packets'($*)) dnl
-
- gen_require(`
- type zabbix_client_packet_t;
- ')
-
- allow $1 zabbix_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_zabbix_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive zabbix_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_zabbix_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zabbix_client_packets'($*)) dnl
-
- gen_require(`
- type zabbix_client_packet_t;
- ')
-
- dontaudit $1 zabbix_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zabbix_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive zabbix_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_zabbix_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zabbix_client_packets'($*)) dnl
-
- corenet_send_zabbix_client_packets($1)
- corenet_receive_zabbix_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zabbix_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive zabbix_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_zabbix_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zabbix_client_packets'($*)) dnl
-
- corenet_dontaudit_send_zabbix_client_packets($1)
- corenet_dontaudit_receive_zabbix_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zabbix_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to zabbix_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_zabbix_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zabbix_client_packets'($*)) dnl
-
- gen_require(`
- type zabbix_client_packet_t;
- ')
-
- allow $1 zabbix_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_zabbix_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send zabbix_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_zabbix_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_zabbix_server_packets'($*)) dnl
-
- gen_require(`
- type zabbix_server_packet_t;
- ')
-
- allow $1 zabbix_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_zabbix_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send zabbix_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_zabbix_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zabbix_server_packets'($*)) dnl
-
- gen_require(`
- type zabbix_server_packet_t;
- ')
-
- dontaudit $1 zabbix_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zabbix_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive zabbix_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_zabbix_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_zabbix_server_packets'($*)) dnl
-
- gen_require(`
- type zabbix_server_packet_t;
- ')
-
- allow $1 zabbix_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_zabbix_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive zabbix_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_zabbix_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zabbix_server_packets'($*)) dnl
-
- gen_require(`
- type zabbix_server_packet_t;
- ')
-
- dontaudit $1 zabbix_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zabbix_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive zabbix_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_zabbix_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zabbix_server_packets'($*)) dnl
-
- corenet_send_zabbix_server_packets($1)
- corenet_receive_zabbix_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zabbix_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive zabbix_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_zabbix_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zabbix_server_packets'($*)) dnl
-
- corenet_dontaudit_send_zabbix_server_packets($1)
- corenet_dontaudit_receive_zabbix_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zabbix_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to zabbix_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_zabbix_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zabbix_server_packets'($*)) dnl
-
- gen_require(`
- type zabbix_server_packet_t;
- ')
-
- allow $1 zabbix_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_zabbix_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the zabbix_agent port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_zabbix_agent_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_zabbix_agent_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_zabbix_agent_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the zabbix_agent port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_zabbix_agent_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_zabbix_agent_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_zabbix_agent_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the zabbix_agent port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_zabbix_agent_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_zabbix_agent_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_zabbix_agent_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the zabbix_agent port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_zabbix_agent_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_zabbix_agent_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_zabbix_agent_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the zabbix_agent port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_zabbix_agent_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_zabbix_agent_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_zabbix_agent_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the zabbix_agent port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_zabbix_agent_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_zabbix_agent_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_zabbix_agent_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the zabbix_agent port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_zabbix_agent_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_zabbix_agent_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_zabbix_agent_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the zabbix_agent port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_zabbix_agent_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_zabbix_agent_port'($*)) dnl
-
- gen_require(`
- type zabbix_agent_port_t;
- ')
-
- allow $1 zabbix_agent_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_zabbix_agent_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the zabbix_agent port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_zabbix_agent_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_zabbix_agent_port'($*)) dnl
-
- gen_require(`
- type zabbix_agent_port_t;
- ')
-
- allow $1 zabbix_agent_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_zabbix_agent_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the zabbix_agent port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_zabbix_agent_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_zabbix_agent_port'($*)) dnl
-
- gen_require(`
- type zabbix_agent_port_t;
- ')
-
- allow $1 zabbix_agent_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_zabbix_agent_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send zabbix_agent_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_zabbix_agent_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_zabbix_agent_client_packets'($*)) dnl
-
- gen_require(`
- type zabbix_agent_client_packet_t;
- ')
-
- allow $1 zabbix_agent_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_zabbix_agent_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send zabbix_agent_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_zabbix_agent_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zabbix_agent_client_packets'($*)) dnl
-
- gen_require(`
- type zabbix_agent_client_packet_t;
- ')
-
- dontaudit $1 zabbix_agent_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zabbix_agent_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive zabbix_agent_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_zabbix_agent_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_zabbix_agent_client_packets'($*)) dnl
-
- gen_require(`
- type zabbix_agent_client_packet_t;
- ')
-
- allow $1 zabbix_agent_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_zabbix_agent_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive zabbix_agent_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_zabbix_agent_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zabbix_agent_client_packets'($*)) dnl
-
- gen_require(`
- type zabbix_agent_client_packet_t;
- ')
-
- dontaudit $1 zabbix_agent_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zabbix_agent_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive zabbix_agent_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_zabbix_agent_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zabbix_agent_client_packets'($*)) dnl
-
- corenet_send_zabbix_agent_client_packets($1)
- corenet_receive_zabbix_agent_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zabbix_agent_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive zabbix_agent_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_zabbix_agent_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zabbix_agent_client_packets'($*)) dnl
-
- corenet_dontaudit_send_zabbix_agent_client_packets($1)
- corenet_dontaudit_receive_zabbix_agent_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zabbix_agent_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to zabbix_agent_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_zabbix_agent_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zabbix_agent_client_packets'($*)) dnl
-
- gen_require(`
- type zabbix_agent_client_packet_t;
- ')
-
- allow $1 zabbix_agent_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_zabbix_agent_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send zabbix_agent_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_zabbix_agent_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_zabbix_agent_server_packets'($*)) dnl
-
- gen_require(`
- type zabbix_agent_server_packet_t;
- ')
-
- allow $1 zabbix_agent_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_zabbix_agent_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send zabbix_agent_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_zabbix_agent_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zabbix_agent_server_packets'($*)) dnl
-
- gen_require(`
- type zabbix_agent_server_packet_t;
- ')
-
- dontaudit $1 zabbix_agent_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zabbix_agent_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive zabbix_agent_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_zabbix_agent_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_zabbix_agent_server_packets'($*)) dnl
-
- gen_require(`
- type zabbix_agent_server_packet_t;
- ')
-
- allow $1 zabbix_agent_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_zabbix_agent_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive zabbix_agent_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_zabbix_agent_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zabbix_agent_server_packets'($*)) dnl
-
- gen_require(`
- type zabbix_agent_server_packet_t;
- ')
-
- dontaudit $1 zabbix_agent_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zabbix_agent_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive zabbix_agent_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_zabbix_agent_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zabbix_agent_server_packets'($*)) dnl
-
- corenet_send_zabbix_agent_server_packets($1)
- corenet_receive_zabbix_agent_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zabbix_agent_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive zabbix_agent_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_zabbix_agent_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zabbix_agent_server_packets'($*)) dnl
-
- corenet_dontaudit_send_zabbix_agent_server_packets($1)
- corenet_dontaudit_receive_zabbix_agent_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zabbix_agent_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to zabbix_agent_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_zabbix_agent_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zabbix_agent_server_packets'($*)) dnl
-
- gen_require(`
- type zabbix_agent_server_packet_t;
- ')
-
- allow $1 zabbix_agent_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_zabbix_agent_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the zookeeper_client port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_zookeeper_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_zookeeper_client_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_zookeeper_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the zookeeper_client port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_zookeeper_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_zookeeper_client_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_zookeeper_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the zookeeper_client port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_zookeeper_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_zookeeper_client_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_zookeeper_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the zookeeper_client port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_zookeeper_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_zookeeper_client_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_zookeeper_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the zookeeper_client port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_zookeeper_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_zookeeper_client_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_zookeeper_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the zookeeper_client port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_zookeeper_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_zookeeper_client_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_zookeeper_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the zookeeper_client port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_zookeeper_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_zookeeper_client_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_zookeeper_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the zookeeper_client port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_zookeeper_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_zookeeper_client_port'($*)) dnl
-
- gen_require(`
- type zookeeper_client_port_t;
- ')
-
- allow $1 zookeeper_client_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_zookeeper_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the zookeeper_client port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_zookeeper_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_zookeeper_client_port'($*)) dnl
-
- gen_require(`
- type zookeeper_client_port_t;
- ')
-
- allow $1 zookeeper_client_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_zookeeper_client_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the zookeeper_client port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_zookeeper_client_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_zookeeper_client_port'($*)) dnl
-
- gen_require(`
- type zookeeper_client_port_t;
- ')
-
- allow $1 zookeeper_client_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_zookeeper_client_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send zookeeper_client_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_zookeeper_client_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_zookeeper_client_client_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_client_client_packet_t;
- ')
-
- allow $1 zookeeper_client_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_zookeeper_client_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send zookeeper_client_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_zookeeper_client_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zookeeper_client_client_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_client_client_packet_t;
- ')
-
- dontaudit $1 zookeeper_client_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zookeeper_client_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive zookeeper_client_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_zookeeper_client_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_zookeeper_client_client_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_client_client_packet_t;
- ')
-
- allow $1 zookeeper_client_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_zookeeper_client_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive zookeeper_client_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_zookeeper_client_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zookeeper_client_client_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_client_client_packet_t;
- ')
-
- dontaudit $1 zookeeper_client_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zookeeper_client_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive zookeeper_client_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_zookeeper_client_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zookeeper_client_client_packets'($*)) dnl
-
- corenet_send_zookeeper_client_client_packets($1)
- corenet_receive_zookeeper_client_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zookeeper_client_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive zookeeper_client_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_zookeeper_client_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zookeeper_client_client_packets'($*)) dnl
-
- corenet_dontaudit_send_zookeeper_client_client_packets($1)
- corenet_dontaudit_receive_zookeeper_client_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zookeeper_client_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to zookeeper_client_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_zookeeper_client_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zookeeper_client_client_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_client_client_packet_t;
- ')
-
- allow $1 zookeeper_client_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_zookeeper_client_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send zookeeper_client_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_zookeeper_client_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_zookeeper_client_server_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_client_server_packet_t;
- ')
-
- allow $1 zookeeper_client_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_zookeeper_client_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send zookeeper_client_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_zookeeper_client_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zookeeper_client_server_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_client_server_packet_t;
- ')
-
- dontaudit $1 zookeeper_client_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zookeeper_client_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive zookeeper_client_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_zookeeper_client_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_zookeeper_client_server_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_client_server_packet_t;
- ')
-
- allow $1 zookeeper_client_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_zookeeper_client_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive zookeeper_client_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_zookeeper_client_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zookeeper_client_server_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_client_server_packet_t;
- ')
-
- dontaudit $1 zookeeper_client_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zookeeper_client_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive zookeeper_client_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_zookeeper_client_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zookeeper_client_server_packets'($*)) dnl
-
- corenet_send_zookeeper_client_server_packets($1)
- corenet_receive_zookeeper_client_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zookeeper_client_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive zookeeper_client_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_zookeeper_client_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zookeeper_client_server_packets'($*)) dnl
-
- corenet_dontaudit_send_zookeeper_client_server_packets($1)
- corenet_dontaudit_receive_zookeeper_client_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zookeeper_client_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to zookeeper_client_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_zookeeper_client_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zookeeper_client_server_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_client_server_packet_t;
- ')
-
- allow $1 zookeeper_client_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_zookeeper_client_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the zookeeper_election port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_zookeeper_election_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_zookeeper_election_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_zookeeper_election_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the zookeeper_election port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_zookeeper_election_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_zookeeper_election_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_zookeeper_election_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the zookeeper_election port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_zookeeper_election_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_zookeeper_election_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_zookeeper_election_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the zookeeper_election port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_zookeeper_election_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_zookeeper_election_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_zookeeper_election_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the zookeeper_election port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_zookeeper_election_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_zookeeper_election_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_zookeeper_election_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the zookeeper_election port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_zookeeper_election_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_zookeeper_election_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_zookeeper_election_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the zookeeper_election port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_zookeeper_election_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_zookeeper_election_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_zookeeper_election_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the zookeeper_election port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_zookeeper_election_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_zookeeper_election_port'($*)) dnl
-
- gen_require(`
- type zookeeper_election_port_t;
- ')
-
- allow $1 zookeeper_election_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_zookeeper_election_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the zookeeper_election port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_zookeeper_election_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_zookeeper_election_port'($*)) dnl
-
- gen_require(`
- type zookeeper_election_port_t;
- ')
-
- allow $1 zookeeper_election_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_zookeeper_election_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the zookeeper_election port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_zookeeper_election_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_zookeeper_election_port'($*)) dnl
-
- gen_require(`
- type zookeeper_election_port_t;
- ')
-
- allow $1 zookeeper_election_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_zookeeper_election_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send zookeeper_election_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_zookeeper_election_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_zookeeper_election_client_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_election_client_packet_t;
- ')
-
- allow $1 zookeeper_election_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_zookeeper_election_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send zookeeper_election_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_zookeeper_election_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zookeeper_election_client_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_election_client_packet_t;
- ')
-
- dontaudit $1 zookeeper_election_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zookeeper_election_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive zookeeper_election_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_zookeeper_election_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_zookeeper_election_client_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_election_client_packet_t;
- ')
-
- allow $1 zookeeper_election_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_zookeeper_election_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive zookeeper_election_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_zookeeper_election_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zookeeper_election_client_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_election_client_packet_t;
- ')
-
- dontaudit $1 zookeeper_election_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zookeeper_election_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive zookeeper_election_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_zookeeper_election_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zookeeper_election_client_packets'($*)) dnl
-
- corenet_send_zookeeper_election_client_packets($1)
- corenet_receive_zookeeper_election_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zookeeper_election_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive zookeeper_election_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_zookeeper_election_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zookeeper_election_client_packets'($*)) dnl
-
- corenet_dontaudit_send_zookeeper_election_client_packets($1)
- corenet_dontaudit_receive_zookeeper_election_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zookeeper_election_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to zookeeper_election_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_zookeeper_election_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zookeeper_election_client_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_election_client_packet_t;
- ')
-
- allow $1 zookeeper_election_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_zookeeper_election_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send zookeeper_election_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_zookeeper_election_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_zookeeper_election_server_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_election_server_packet_t;
- ')
-
- allow $1 zookeeper_election_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_zookeeper_election_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send zookeeper_election_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_zookeeper_election_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zookeeper_election_server_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_election_server_packet_t;
- ')
-
- dontaudit $1 zookeeper_election_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zookeeper_election_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive zookeeper_election_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_zookeeper_election_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_zookeeper_election_server_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_election_server_packet_t;
- ')
-
- allow $1 zookeeper_election_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_zookeeper_election_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive zookeeper_election_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_zookeeper_election_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zookeeper_election_server_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_election_server_packet_t;
- ')
-
- dontaudit $1 zookeeper_election_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zookeeper_election_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive zookeeper_election_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_zookeeper_election_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zookeeper_election_server_packets'($*)) dnl
-
- corenet_send_zookeeper_election_server_packets($1)
- corenet_receive_zookeeper_election_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zookeeper_election_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive zookeeper_election_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_zookeeper_election_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zookeeper_election_server_packets'($*)) dnl
-
- corenet_dontaudit_send_zookeeper_election_server_packets($1)
- corenet_dontaudit_receive_zookeeper_election_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zookeeper_election_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to zookeeper_election_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_zookeeper_election_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zookeeper_election_server_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_election_server_packet_t;
- ')
-
- allow $1 zookeeper_election_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_zookeeper_election_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the zookeeper_leader port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_zookeeper_leader_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_zookeeper_leader_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_zookeeper_leader_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the zookeeper_leader port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_zookeeper_leader_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_zookeeper_leader_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_zookeeper_leader_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the zookeeper_leader port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_zookeeper_leader_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_zookeeper_leader_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_zookeeper_leader_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the zookeeper_leader port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_zookeeper_leader_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_zookeeper_leader_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_zookeeper_leader_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the zookeeper_leader port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_zookeeper_leader_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_zookeeper_leader_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_zookeeper_leader_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the zookeeper_leader port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_zookeeper_leader_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_zookeeper_leader_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_zookeeper_leader_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the zookeeper_leader port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_zookeeper_leader_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_zookeeper_leader_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_zookeeper_leader_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the zookeeper_leader port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_zookeeper_leader_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_zookeeper_leader_port'($*)) dnl
-
- gen_require(`
- type zookeeper_leader_port_t;
- ')
-
- allow $1 zookeeper_leader_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_zookeeper_leader_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the zookeeper_leader port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_zookeeper_leader_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_zookeeper_leader_port'($*)) dnl
-
- gen_require(`
- type zookeeper_leader_port_t;
- ')
-
- allow $1 zookeeper_leader_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_zookeeper_leader_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the zookeeper_leader port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_zookeeper_leader_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_zookeeper_leader_port'($*)) dnl
-
- gen_require(`
- type zookeeper_leader_port_t;
- ')
-
- allow $1 zookeeper_leader_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_zookeeper_leader_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send zookeeper_leader_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_zookeeper_leader_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_zookeeper_leader_client_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_leader_client_packet_t;
- ')
-
- allow $1 zookeeper_leader_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_zookeeper_leader_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send zookeeper_leader_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_zookeeper_leader_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zookeeper_leader_client_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_leader_client_packet_t;
- ')
-
- dontaudit $1 zookeeper_leader_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zookeeper_leader_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive zookeeper_leader_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_zookeeper_leader_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_zookeeper_leader_client_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_leader_client_packet_t;
- ')
-
- allow $1 zookeeper_leader_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_zookeeper_leader_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive zookeeper_leader_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_zookeeper_leader_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zookeeper_leader_client_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_leader_client_packet_t;
- ')
-
- dontaudit $1 zookeeper_leader_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zookeeper_leader_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive zookeeper_leader_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_zookeeper_leader_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zookeeper_leader_client_packets'($*)) dnl
-
- corenet_send_zookeeper_leader_client_packets($1)
- corenet_receive_zookeeper_leader_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zookeeper_leader_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive zookeeper_leader_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_zookeeper_leader_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zookeeper_leader_client_packets'($*)) dnl
-
- corenet_dontaudit_send_zookeeper_leader_client_packets($1)
- corenet_dontaudit_receive_zookeeper_leader_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zookeeper_leader_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to zookeeper_leader_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_zookeeper_leader_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zookeeper_leader_client_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_leader_client_packet_t;
- ')
-
- allow $1 zookeeper_leader_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_zookeeper_leader_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send zookeeper_leader_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_zookeeper_leader_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_zookeeper_leader_server_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_leader_server_packet_t;
- ')
-
- allow $1 zookeeper_leader_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_zookeeper_leader_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send zookeeper_leader_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_zookeeper_leader_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zookeeper_leader_server_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_leader_server_packet_t;
- ')
-
- dontaudit $1 zookeeper_leader_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zookeeper_leader_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive zookeeper_leader_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_zookeeper_leader_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_zookeeper_leader_server_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_leader_server_packet_t;
- ')
-
- allow $1 zookeeper_leader_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_zookeeper_leader_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive zookeeper_leader_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_zookeeper_leader_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zookeeper_leader_server_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_leader_server_packet_t;
- ')
-
- dontaudit $1 zookeeper_leader_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zookeeper_leader_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive zookeeper_leader_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_zookeeper_leader_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zookeeper_leader_server_packets'($*)) dnl
-
- corenet_send_zookeeper_leader_server_packets($1)
- corenet_receive_zookeeper_leader_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zookeeper_leader_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive zookeeper_leader_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_zookeeper_leader_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zookeeper_leader_server_packets'($*)) dnl
-
- corenet_dontaudit_send_zookeeper_leader_server_packets($1)
- corenet_dontaudit_receive_zookeeper_leader_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zookeeper_leader_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to zookeeper_leader_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_zookeeper_leader_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zookeeper_leader_server_packets'($*)) dnl
-
- gen_require(`
- type zookeeper_leader_server_packet_t;
- ')
-
- allow $1 zookeeper_leader_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_zookeeper_leader_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the zebra port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_zebra_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_zebra_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_zebra_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the zebra port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_zebra_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_zebra_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_zebra_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the zebra port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_zebra_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_zebra_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_zebra_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the zebra port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_zebra_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_zebra_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_zebra_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the zebra port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_zebra_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_zebra_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_zebra_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the zebra port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_zebra_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_zebra_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_zebra_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the zebra port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_zebra_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_zebra_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_zebra_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the zebra port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_zebra_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_zebra_port'($*)) dnl
-
- gen_require(`
- type zebra_port_t;
- ')
-
- allow $1 zebra_port_t:tcp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_zebra_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the zebra port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_zebra_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_zebra_port'($*)) dnl
-
- gen_require(`
- type zebra_port_t;
- ')
-
- allow $1 zebra_port_t:udp_socket name_bind;
- allow $1 self:capability net_bind_service;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_zebra_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the zebra port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_zebra_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_zebra_port'($*)) dnl
-
- gen_require(`
- type zebra_port_t;
- ')
-
- allow $1 zebra_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_zebra_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send zebra_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_zebra_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_zebra_client_packets'($*)) dnl
-
- gen_require(`
- type zebra_client_packet_t;
- ')
-
- allow $1 zebra_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_zebra_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send zebra_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_zebra_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zebra_client_packets'($*)) dnl
-
- gen_require(`
- type zebra_client_packet_t;
- ')
-
- dontaudit $1 zebra_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zebra_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive zebra_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_zebra_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_zebra_client_packets'($*)) dnl
-
- gen_require(`
- type zebra_client_packet_t;
- ')
-
- allow $1 zebra_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_zebra_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive zebra_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_zebra_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zebra_client_packets'($*)) dnl
-
- gen_require(`
- type zebra_client_packet_t;
- ')
-
- dontaudit $1 zebra_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zebra_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive zebra_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_zebra_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zebra_client_packets'($*)) dnl
-
- corenet_send_zebra_client_packets($1)
- corenet_receive_zebra_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zebra_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive zebra_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_zebra_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zebra_client_packets'($*)) dnl
-
- corenet_dontaudit_send_zebra_client_packets($1)
- corenet_dontaudit_receive_zebra_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zebra_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to zebra_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_zebra_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zebra_client_packets'($*)) dnl
-
- gen_require(`
- type zebra_client_packet_t;
- ')
-
- allow $1 zebra_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_zebra_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send zebra_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_zebra_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_zebra_server_packets'($*)) dnl
-
- gen_require(`
- type zebra_server_packet_t;
- ')
-
- allow $1 zebra_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_zebra_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send zebra_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_zebra_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zebra_server_packets'($*)) dnl
-
- gen_require(`
- type zebra_server_packet_t;
- ')
-
- dontaudit $1 zebra_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zebra_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive zebra_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_zebra_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_zebra_server_packets'($*)) dnl
-
- gen_require(`
- type zebra_server_packet_t;
- ')
-
- allow $1 zebra_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_zebra_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive zebra_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_zebra_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zebra_server_packets'($*)) dnl
-
- gen_require(`
- type zebra_server_packet_t;
- ')
-
- dontaudit $1 zebra_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zebra_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive zebra_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_zebra_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zebra_server_packets'($*)) dnl
-
- corenet_send_zebra_server_packets($1)
- corenet_receive_zebra_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zebra_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive zebra_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_zebra_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zebra_server_packets'($*)) dnl
-
- corenet_dontaudit_send_zebra_server_packets($1)
- corenet_dontaudit_receive_zebra_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zebra_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to zebra_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_zebra_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zebra_server_packets'($*)) dnl
-
- gen_require(`
- type zebra_server_packet_t;
- ')
-
- allow $1 zebra_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_zebra_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the zented port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_zented_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_zented_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_zented_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the zented port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_zented_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_zented_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_zented_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the zented port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_zented_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_zented_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_zented_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the zented port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_zented_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_zented_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_zented_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the zented port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_zented_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_zented_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_zented_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the zented port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_zented_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_zented_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_zented_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the zented port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_zented_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_zented_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_zented_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the zented port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_zented_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_zented_port'($*)) dnl
-
- gen_require(`
- type zented_port_t;
- ')
-
- allow $1 zented_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_zented_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the zented port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_zented_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_zented_port'($*)) dnl
-
- gen_require(`
- type zented_port_t;
- ')
-
- allow $1 zented_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_zented_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the zented port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_zented_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_zented_port'($*)) dnl
-
- gen_require(`
- type zented_port_t;
- ')
-
- allow $1 zented_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_zented_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send zented_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_zented_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_zented_client_packets'($*)) dnl
-
- gen_require(`
- type zented_client_packet_t;
- ')
-
- allow $1 zented_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_zented_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send zented_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_zented_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zented_client_packets'($*)) dnl
-
- gen_require(`
- type zented_client_packet_t;
- ')
-
- dontaudit $1 zented_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zented_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive zented_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_zented_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_zented_client_packets'($*)) dnl
-
- gen_require(`
- type zented_client_packet_t;
- ')
-
- allow $1 zented_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_zented_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive zented_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_zented_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zented_client_packets'($*)) dnl
-
- gen_require(`
- type zented_client_packet_t;
- ')
-
- dontaudit $1 zented_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zented_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive zented_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_zented_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zented_client_packets'($*)) dnl
-
- corenet_send_zented_client_packets($1)
- corenet_receive_zented_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zented_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive zented_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_zented_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zented_client_packets'($*)) dnl
-
- corenet_dontaudit_send_zented_client_packets($1)
- corenet_dontaudit_receive_zented_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zented_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to zented_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_zented_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zented_client_packets'($*)) dnl
-
- gen_require(`
- type zented_client_packet_t;
- ')
-
- allow $1 zented_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_zented_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send zented_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_zented_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_zented_server_packets'($*)) dnl
-
- gen_require(`
- type zented_server_packet_t;
- ')
-
- allow $1 zented_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_zented_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send zented_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_zented_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zented_server_packets'($*)) dnl
-
- gen_require(`
- type zented_server_packet_t;
- ')
-
- dontaudit $1 zented_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zented_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive zented_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_zented_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_zented_server_packets'($*)) dnl
-
- gen_require(`
- type zented_server_packet_t;
- ')
-
- allow $1 zented_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_zented_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive zented_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_zented_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zented_server_packets'($*)) dnl
-
- gen_require(`
- type zented_server_packet_t;
- ')
-
- dontaudit $1 zented_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zented_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive zented_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_zented_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zented_server_packets'($*)) dnl
-
- corenet_send_zented_server_packets($1)
- corenet_receive_zented_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zented_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive zented_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_zented_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zented_server_packets'($*)) dnl
-
- corenet_dontaudit_send_zented_server_packets($1)
- corenet_dontaudit_receive_zented_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zented_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to zented_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_zented_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zented_server_packets'($*)) dnl
-
- gen_require(`
- type zented_server_packet_t;
- ')
-
- allow $1 zented_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_zented_server_packets'($*)) dnl
- ')
-
-
-
-
-
-########################################
-##
-## Send and receive TCP traffic on the zope port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_zope_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_zope_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_zope_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP traffic on the zope port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_zope_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_zope_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_zope_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send UDP traffic on the zope port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_send_zope_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_zope_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_zope_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP traffic on the zope port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_zope_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_zope_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_zope_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP traffic on the zope port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_receive_zope_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_zope_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_zope_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP traffic on the zope port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_zope_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_zope_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_zope_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive
-## UDP traffic on the zope port.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_udp_sendrecv_zope_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_zope_port'($*)) dnl
-
- refpolicywarn(`$0() has been deprecated, please remove.')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_zope_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind TCP sockets to the zope port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_bind_zope_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_zope_port'($*)) dnl
-
- gen_require(`
- type zope_port_t;
- ')
-
- allow $1 zope_port_t:tcp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_zope_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Bind UDP sockets to the zope port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_bind_zope_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_zope_port'($*)) dnl
-
- gen_require(`
- type zope_port_t;
- ')
-
- allow $1 zope_port_t:udp_socket name_bind;
-
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_bind_zope_port'($*)) dnl
- ')
-
-
-########################################
-##
-## Make a TCP connection to the zope port.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_tcp_connect_zope_port',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_zope_port'($*)) dnl
-
- gen_require(`
- type zope_port_t;
- ')
-
- allow $1 zope_port_t:tcp_socket name_connect;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_zope_port'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send zope_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_zope_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_zope_client_packets'($*)) dnl
-
- gen_require(`
- type zope_client_packet_t;
- ')
-
- allow $1 zope_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_zope_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send zope_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_zope_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zope_client_packets'($*)) dnl
-
- gen_require(`
- type zope_client_packet_t;
- ')
-
- dontaudit $1 zope_client_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zope_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive zope_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_zope_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_zope_client_packets'($*)) dnl
-
- gen_require(`
- type zope_client_packet_t;
- ')
-
- allow $1 zope_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_zope_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive zope_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_zope_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zope_client_packets'($*)) dnl
-
- gen_require(`
- type zope_client_packet_t;
- ')
-
- dontaudit $1 zope_client_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zope_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive zope_client packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_zope_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zope_client_packets'($*)) dnl
-
- corenet_send_zope_client_packets($1)
- corenet_receive_zope_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zope_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive zope_client packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_zope_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zope_client_packets'($*)) dnl
-
- corenet_dontaudit_send_zope_client_packets($1)
- corenet_dontaudit_receive_zope_client_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zope_client_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to zope_client the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_zope_client_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zope_client_packets'($*)) dnl
-
- gen_require(`
- type zope_client_packet_t;
- ')
-
- allow $1 zope_client_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_zope_client_packets'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Send zope_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_send_zope_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_send_zope_server_packets'($*)) dnl
-
- gen_require(`
- type zope_server_packet_t;
- ')
-
- allow $1 zope_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_send_zope_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send zope_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_send_zope_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zope_server_packets'($*)) dnl
-
- gen_require(`
- type zope_server_packet_t;
- ')
-
- dontaudit $1 zope_server_packet_t:packet send;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zope_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive zope_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_receive_zope_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_receive_zope_server_packets'($*)) dnl
-
- gen_require(`
- type zope_server_packet_t;
- ')
-
- allow $1 zope_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_receive_zope_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive zope_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_dontaudit_receive_zope_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zope_server_packets'($*)) dnl
-
- gen_require(`
- type zope_server_packet_t;
- ')
-
- dontaudit $1 zope_server_packet_t:packet recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zope_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive zope_server packets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_sendrecv_zope_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zope_server_packets'($*)) dnl
-
- corenet_send_zope_server_packets($1)
- corenet_receive_zope_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zope_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive zope_server packets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`corenet_dontaudit_sendrecv_zope_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zope_server_packets'($*)) dnl
-
- corenet_dontaudit_send_zope_server_packets($1)
- corenet_dontaudit_receive_zope_server_packets($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zope_server_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel packets to zope_server the packet type.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`corenet_relabelto_zope_server_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zope_server_packets'($*)) dnl
-
- gen_require(`
- type zope_server_packet_t;
- ')
-
- allow $1 zope_server_packet_t:packet relabelto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_relabelto_zope_server_packets'($*)) dnl
- ')
-
-
-
-
-
-
-########################################
-##
-## Send and receive TCP network traffic on the lo interface.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_tcp_sendrecv_lo_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_lo_if'($*)) dnl
-
- gen_require(`
- type lo_netif_t;
- ')
-
- allow $1 lo_netif_t:netif { egress ingress };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_lo_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Send UDP network traffic on the lo interface.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_send_lo_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_send_lo_if'($*)) dnl
-
- gen_require(`
- type lo_netif_t;
- ')
-
- allow $1 lo_netif_t:netif { egress };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_send_lo_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP network traffic on the lo interface.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_receive_lo_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_lo_if'($*)) dnl
-
- gen_require(`
- type lo_netif_t;
- ')
-
- allow $1 lo_netif_t:netif { ingress };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_receive_lo_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive UDP network traffic on the lo interface.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_udp_sendrecv_lo_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_lo_if'($*)) dnl
-
- corenet_udp_send_lo_if($1)
- corenet_udp_receive_lo_if($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_lo_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Send raw IP packets on the lo interface.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_raw_send_lo_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_raw_send_lo_if'($*)) dnl
-
- gen_require(`
- type lo_netif_t;
- ')
-
- allow $1 lo_netif_t:netif { egress };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_raw_send_lo_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive raw IP packets on the lo interface.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_raw_receive_lo_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_raw_receive_lo_if'($*)) dnl
-
- gen_require(`
- type lo_netif_t;
- ')
-
- allow $1 lo_netif_t:netif { ingress };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_raw_receive_lo_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive raw IP packets on the lo interface.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`corenet_raw_sendrecv_lo_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `corenet_raw_sendrecv_lo_if'($*)) dnl
-
- corenet_raw_send_lo_if($1)
- corenet_raw_receive_lo_if($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `corenet_raw_sendrecv_lo_if'($*)) dnl
- ')
-
-
-
-
-##
-## Policy for kernel threads, proc filesystem,
-## and unlabeled processes and objects.
-##
-##
-## This module has initial SIDs.
-##
-
-########################################
-##
-## Allows the kernel to start userland processes
-## by dynamic transitions to the specified domain.
-##
-##
-##
-## The process type entered by the kernel.
-##
-##
-#
- define(`kernel_dyntrans_to',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dyntrans_to'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- domain_dyntrans_type(kernel_t)
- allow kernel_t self:process setcurrent;
- allow kernel_t $1:process dyntransition;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dyntrans_to'($*)) dnl
- ')
-
-
-########################################
-##
-## Allows to start userland processes
-## by transitioning to the specified domain.
-##
-##
-##
-## The process type entered by kernel.
-##
-##
-##
-##
-## The executable type for the entrypoint.
-##
-##
-#
- define(`kernel_domtrans_to',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_domtrans_to'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- domtrans_pattern(kernel_t, $2, $1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_domtrans_to'($*)) dnl
- ')
-
-
-########################################
-##
-## Allows to start userland processes
-## by transitioning to the specified domain,
-## with a range transition.
-##
-##
-##
-## The process type entered by kernel.
-##
-##
-##
-##
-## The executable type for the entrypoint.
-##
-##
-##
-##
-## Range for the domain.
-##
-##
-#
- define(`kernel_ranged_domtrans_to',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_ranged_domtrans_to'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- kernel_domtrans_to($1, $2)
-
- ifdef(`enable_mcs',`
- range_transition kernel_t $2:process $3;
- ')
-
- ifdef(`enable_mls',`
- range_transition kernel_t $2:process $3;
- mls_rangetrans_target($1)
- ')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_ranged_domtrans_to'($*)) dnl
- ')
-
-
-########################################
-##
-## Allows the kernel to mount filesystems on
-## the specified directory type.
-##
-##
-##
-## The type of the directory to use as a mountpoint.
-##
-##
-#
- define(`kernel_rootfs_mountpoint',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_rootfs_mountpoint'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- allow kernel_t $1:dir mounton;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_rootfs_mountpoint'($*)) dnl
- ')
-
-
-########################################
-##
-## Set the process group of kernel threads.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_setpgid',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_setpgid'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- allow $1 kernel_t:process setpgid;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_setpgid'($*)) dnl
- ')
-
-
-########################################
-##
-## Set the priority of kernel threads.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_setsched',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_setsched'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- allow $1 kernel_t:process setsched;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_setsched'($*)) dnl
- ')
-
-
-########################################
-##
-## Send a SIGCHLD signal to kernel threads.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_sigchld',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_sigchld'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- allow $1 kernel_t:process sigchld;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_sigchld'($*)) dnl
- ')
-
-
-########################################
-##
-## Send a kill signal to kernel threads.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_kill',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_kill'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- allow $1 kernel_t:process sigkill;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_kill'($*)) dnl
- ')
-
-
-########################################
-##
-## Send a generic signal to kernel threads.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_signal',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_signal'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- allow $1 kernel_t:process signal;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_signal'($*)) dnl
- ')
-
-
-########################################
-##
-## Allows the kernel to share state information with
-## the caller.
-##
-##
-##
-## The type of the process with which to share state information.
-##
-##
-#
- define(`kernel_share_state',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_share_state'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- allow kernel_t $1:process share;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_share_state'($*)) dnl
- ')
-
-
-########################################
-##
-## Permits caller to use kernel file descriptors.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_use_fds',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_use_fds'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- allow $1 kernel_t:fd use;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_use_fds'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to use
-## kernel file descriptors.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_use_fds',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_use_fds'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- dontaudit $1 kernel_t:fd use;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_use_fds'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write kernel unnamed pipes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_rw_pipes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_rw_pipes'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- allow $1 kernel_t:fifo_file { read write };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_rw_pipes'($*)) dnl
- ')
-
-
-########################################
-##
-## Read/write to kernel using a unix
-## domain stream socket.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_rw_stream_sockets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_rw_stream_sockets'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- allow $1 kernel_t:unix_stream_socket rw_socket_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_rw_stream_sockets'($*)) dnl
- ')
-
-
-########################################
-##
-## Connect to kernel using a unix
-## domain stream socket.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_stream_connect',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_stream_connect'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- allow $1 kernel_t:unix_stream_socket connectto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_stream_connect'($*)) dnl
- ')
-
-
-########################################
-##
-## Getattr on kernel unix datagram sockets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_getattr_dgram_sockets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_getattr_dgram_sockets'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- allow $1 kernel_t:unix_dgram_socket getattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_getattr_dgram_sockets'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write kernel unix datagram sockets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_rw_unix_dgram_sockets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_rw_unix_dgram_sockets'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- allow $1 kernel_t:unix_dgram_socket { read write ioctl };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_rw_unix_dgram_sockets'($*)) dnl
- ')
-
-
-########################################
-##
-## Send messages to kernel unix datagram sockets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_dgram_send',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dgram_send'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- allow $1 kernel_t:unix_dgram_socket sendto;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dgram_send'($*)) dnl
- ')
-
-
-########################################
-##
-## Allows caller to load kernel modules
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_load_module',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_load_module'($*)) dnl
-
- gen_require(`
- attribute can_load_kernmodule;
- ')
-
- typeattribute $1 can_load_kernmodule;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_load_module'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow search the kernel key ring.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_search_key',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_search_key'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- allow $1 kernel_t:key search;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_search_key'($*)) dnl
- ')
-
-
-########################################
-##
-## dontaudit search the kernel key ring.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_search_key',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_search_key'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- dontaudit $1 kernel_t:key search;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_search_key'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow link to the kernel key ring.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_link_key',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_link_key'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- allow $1 kernel_t:key link;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_link_key'($*)) dnl
- ')
-
-
-########################################
-##
-## dontaudit link to the kernel key ring.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_link_key',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_link_key'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- dontaudit $1 kernel_t:key link;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_link_key'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow view the kernel key ring.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_view_key',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_view_key'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- allow $1 kernel_t:key view;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_view_key'($*)) dnl
- ')
-
-
-########################################
-##
-## dontaudit view the kernel key ring.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_view_key',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_view_key'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- dontaudit $1 kernel_t:key view;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_view_key'($*)) dnl
- ')
-
-
-########################################
-##
-## Allows caller to read the ring buffer.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_read_ring_buffer',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_ring_buffer'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- allow $1 self:capability2 syslog;
- allow $1 kernel_t:system syslog_read;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_ring_buffer'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to read the ring buffer.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_read_ring_buffer',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_read_ring_buffer'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- dontaudit $1 kernel_t:system syslog_read;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_read_ring_buffer'($*)) dnl
- ')
-
-
-########################################
-##
-## Change the level of kernel messages logged to the console.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_change_ring_buffer_level',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_change_ring_buffer_level'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- allow $1 self:capability2 syslog;
- allow $1 kernel_t:system syslog_console;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_change_ring_buffer_level'($*)) dnl
- ')
-
-
-########################################
-##
-## Allows the caller to clear the ring buffer.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_clear_ring_buffer',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_clear_ring_buffer'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- allow $1 self:capability2 syslog;
- allow $1 kernel_t:system syslog_mod;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_clear_ring_buffer'($*)) dnl
- ')
-
-
-########################################
-##
-## Allows caller to request the kernel to load a module
-##
-##
-##
-## Allow the specified domain to request that the kernel
-## load a kernel module. An example of this is the
-## auto-loading of network drivers when doing an
-## ioctl() on a network interface.
-##
-##
-## In the specific case of a module loading request
-## on a network interface, the domain will also
-## need the net_admin capability.
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_request_load_module',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_request_load_module'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- allow $1 kernel_t:system module_request;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_request_load_module'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit requests to the kernel to load a module.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_request_load_module',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_request_load_module'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- dontaudit $1 kernel_t:system module_request;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_request_load_module'($*)) dnl
- ')
-
-
-########################################
-##
-## Get information on all System V IPC objects.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_get_sysvipc_info',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_get_sysvipc_info'($*)) dnl
-
- gen_require(`
- type kernel_t;
- ')
-
- allow $1 kernel_t:system ipc_info;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_get_sysvipc_info'($*)) dnl
- ')
-
-
-########################################
-##
-## Get the attributes of a kernel debugging filesystem.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_getattr_debugfs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_getattr_debugfs'($*)) dnl
-
- gen_require(`
- type debugfs_t;
- ')
-
- allow $1 debugfs_t:filesystem getattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_getattr_debugfs'($*)) dnl
- ')
-
-
-########################################
-##
-## Mount a kernel debugging filesystem.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_mount_debugfs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_mount_debugfs'($*)) dnl
-
- gen_require(`
- type debugfs_t;
- ')
-
- allow $1 debugfs_t:filesystem mount;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_mount_debugfs'($*)) dnl
- ')
-
-
-########################################
-##
-## Unmount a kernel debugging filesystem.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_unmount_debugfs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_unmount_debugfs'($*)) dnl
-
- gen_require(`
- type debugfs_t;
- ')
-
- allow $1 debugfs_t:filesystem unmount;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_unmount_debugfs'($*)) dnl
- ')
-
-
-########################################
-##
-## Remount a kernel debugging filesystem.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_remount_debugfs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_remount_debugfs'($*)) dnl
-
- gen_require(`
- type debugfs_t;
- ')
-
- allow $1 debugfs_t:filesystem remount;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_remount_debugfs'($*)) dnl
- ')
-
-
-########################################
-##
-## Search the contents of a kernel debugging filesystem.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_search_debugfs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_search_debugfs'($*)) dnl
-
- gen_require(`
- type debugfs_t;
- ')
-
- search_dirs_pattern($1, debugfs_t, debugfs_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_search_debugfs'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to search the kernel debugging filesystem.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_search_debugfs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_search_debugfs'($*)) dnl
-
- gen_require(`
- type debugfs_t;
- ')
-
- dontaudit $1 debugfs_t:dir search_dir_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_search_debugfs'($*)) dnl
- ')
-
-
-########################################
-##
-## Read information from the debugging filesystem.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_read_debugfs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_debugfs'($*)) dnl
-
- gen_require(`
- type debugfs_t;
- ')
-
- read_files_pattern($1, debugfs_t, debugfs_t)
- read_lnk_files_pattern($1, debugfs_t, debugfs_t)
- list_dirs_pattern($1, debugfs_t, debugfs_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_debugfs'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to write kernel debugging filesystem dirs.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_write_debugfs_dirs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_write_debugfs_dirs'($*)) dnl
-
- gen_require(`
- type debugfs_t;
- ')
-
- dontaudit $1 debugfs_t:dir write;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_write_debugfs_dirs'($*)) dnl
- ')
-
-
-########################################
-##
-## Manage information from the debugging filesystem.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_manage_debugfs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_manage_debugfs'($*)) dnl
-
- gen_require(`
- type debugfs_t;
- ')
-
- manage_files_pattern($1, debugfs_t, debugfs_t)
- read_lnk_files_pattern($1, debugfs_t, debugfs_t)
- list_dirs_pattern($1, debugfs_t, debugfs_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_manage_debugfs'($*)) dnl
- ')
-
-
-########################################
-##
-## Mount a kernel VM filesystem.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_mount_kvmfs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_mount_kvmfs'($*)) dnl
-
- gen_require(`
- type kvmfs_t;
- ')
-
- allow $1 kvmfs_t:filesystem mount;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_mount_kvmfs'($*)) dnl
- ')
-
-
-########################################
-##
-## mount the proc filesystem.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_mount_proc',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_mount_proc'($*)) dnl
-
- gen_require(`
- type proc_t;
- ')
-
- allow $1 proc_t:filesystem mount;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_mount_proc'($*)) dnl
- ')
-
-
-########################################
-##
-## remount the proc filesystem.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_remount_proc',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_remount_proc'($*)) dnl
-
- gen_require(`
- type proc_t;
- ')
-
- allow $1 proc_t:filesystem remount;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_remount_proc'($*)) dnl
- ')
-
-
-########################################
-##
-## Unmount the proc filesystem.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_unmount_proc',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_unmount_proc'($*)) dnl
-
- gen_require(`
- type proc_t;
- ')
-
- allow $1 proc_t:filesystem unmount;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_unmount_proc'($*)) dnl
- ')
-
-
-########################################
-##
-## Get the attributes of the proc filesystem.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_getattr_proc',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_getattr_proc'($*)) dnl
-
- gen_require(`
- type proc_t;
- ')
-
- allow $1 proc_t:filesystem getattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_getattr_proc'($*)) dnl
- ')
-
-
-########################################
-##
-## Mount on proc directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_mounton_proc',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_mounton_proc'($*)) dnl
-
- gen_require(`
- type proc_t;
- ')
-
- allow $1 proc_t:dir mounton;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_mounton_proc'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to set the
-## attributes of directories in /proc.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_setattr_proc_dirs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_setattr_proc_dirs'($*)) dnl
-
- gen_require(`
- type proc_t;
- ')
-
- dontaudit $1 proc_t:dir setattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_setattr_proc_dirs'($*)) dnl
- ')
-
-
-########################################
-##
-## Search directories in /proc.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_search_proc',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_search_proc'($*)) dnl
-
- gen_require(`
- type proc_t;
- ')
-
- search_dirs_pattern($1, proc_t, proc_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_search_proc'($*)) dnl
- ')
-
-
-########################################
-##
-## List the contents of directories in /proc.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_list_proc',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_list_proc'($*)) dnl
-
- gen_require(`
- type proc_t;
- ')
-
- list_dirs_pattern($1, proc_t, proc_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_list_proc'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to list the
-## contents of directories in /proc.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_list_proc',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_list_proc'($*)) dnl
-
- gen_require(`
- type proc_t;
- ')
-
- dontaudit $1 proc_t:dir list_dir_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_list_proc'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to write the
-## directories in /proc.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_write_proc_dirs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_write_proc_dirs'($*)) dnl
-
- gen_require(`
- type proc_t;
- ')
-
- dontaudit $1 proc_t:dir write;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_write_proc_dirs'($*)) dnl
- ')
-
-
-########################################
-##
-## Mount the directories in /proc.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_mounton_proc_dirs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_mounton_proc_dirs'($*)) dnl
-
- gen_require(`
- type proc_t;
- ')
-
- allow $1 proc_t:dir mounton;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_mounton_proc_dirs'($*)) dnl
- ')
-
-
-########################################
-##
-## Get the attributes of files in /proc.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_getattr_proc_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_getattr_proc_files'($*)) dnl
-
- gen_require(`
- type proc_t;
- ')
-
- getattr_files_pattern($1, proc_t, proc_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_getattr_proc_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Read generic symbolic links in /proc.
-##
-##
-##
-## Allow the specified domain to read (follow) generic
-## symbolic links (symlinks) in the proc filesystem (/proc).
-## This interface does not include access to the targets of
-## these links. An example symlink is /proc/self.
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_read_proc_symlinks',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_proc_symlinks'($*)) dnl
-
- gen_require(`
- type proc_t;
- ')
-
- read_lnk_files_pattern($1, proc_t, proc_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_proc_symlinks'($*)) dnl
- ')
-
-
-########################################
-##
-## Allows caller to read system state information in /proc.
-##
-##
-##
-## Allow the specified domain to read general system
-## state information from the proc filesystem (/proc).
-##
-##
-## Generally it should be safe to allow this access. Some
-## example files that can be read based on this interface:
-##
-##
-## - /proc/cpuinfo
-## - /proc/meminfo
-## - /proc/uptime
-##
-##
-## This does not allow access to sysctl entries (/proc/sys/*)
-## nor process state information (/proc/pid).
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-#
- define(`kernel_read_system_state',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_system_state'($*)) dnl
-
- gen_require(`
- type proc_t;
- ')
-
- read_files_pattern($1, proc_t, proc_t)
- read_lnk_files_pattern($1, proc_t, proc_t)
-
- list_dirs_pattern($1, proc_t, proc_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_system_state'($*)) dnl
- ')
-
-
-########################################
-##
-## Write to generic proc entries.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
-# cjp: this should probably go away. any
-# file thats writable in proc should really
-# have its own label.
-#
- define(`kernel_write_proc_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_write_proc_files'($*)) dnl
-
- gen_require(`
- type proc_t;
- ')
-
- write_files_pattern($1, proc_t, proc_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_write_proc_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts by caller to
-## read system state information in proc.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_read_system_state',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_read_system_state'($*)) dnl
-
- gen_require(`
- type proc_t;
- ')
-
- dontaudit $1 proc_t:file read_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_read_system_state'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts by caller to
-## read symbolic links in proc.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_read_proc_symlinks',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_read_proc_symlinks'($*)) dnl
-
- gen_require(`
- type proc_t;
- ')
-
- dontaudit $1 proc_t:lnk_file read;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_read_proc_symlinks'($*)) dnl
- ')
-
-
-#######################################
-##
-## Allow caller to read and write state information for AFS.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_rw_afs_state',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_rw_afs_state'($*)) dnl
-
- gen_require(`
- type proc_t, proc_afs_t;
- ')
-
- list_dirs_pattern($1, proc_t, proc_t)
- rw_files_pattern($1, proc_afs_t, proc_afs_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_rw_afs_state'($*)) dnl
- ')
-
-
-#######################################
-##
-## Allow caller to read the state information for software raid.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_read_software_raid_state',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_software_raid_state'($*)) dnl
-
- gen_require(`
- type proc_t, proc_mdstat_t;
- ')
-
- read_files_pattern($1, proc_t, proc_mdstat_t)
-
- list_dirs_pattern($1, proc_t, proc_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_software_raid_state'($*)) dnl
- ')
-
-
-#######################################
-##
-## Allow caller to read and set the state information for software raid.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_rw_software_raid_state',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_rw_software_raid_state'($*)) dnl
-
- gen_require(`
- type proc_t, proc_mdstat_t;
- ')
-
- rw_files_pattern($1, proc_t, proc_mdstat_t)
-
- list_dirs_pattern($1, proc_t, proc_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_rw_software_raid_state'($*)) dnl
- ')
-
-
-########################################
-##
-## Allows caller to get attribues of core kernel interface.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_getattr_core_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_getattr_core_if'($*)) dnl
-
- gen_require(`
- type proc_t, proc_kcore_t;
- ')
-
- getattr_files_pattern($1, proc_t, proc_kcore_t)
-
- list_dirs_pattern($1, proc_t, proc_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_getattr_core_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to get the attributes of
-## core kernel interfaces.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_getattr_core_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_getattr_core_if'($*)) dnl
-
- gen_require(`
- type proc_kcore_t;
- ')
-
- dontaudit $1 proc_kcore_t:file getattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_getattr_core_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Allows caller to read the core kernel interface.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_read_core_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_core_if'($*)) dnl
-
- gen_require(`
- type proc_t, proc_kcore_t;
- attribute can_dump_kernel;
- ')
-
- allow $1 self:capability sys_rawio;
- read_files_pattern($1, proc_t, proc_kcore_t)
- list_dirs_pattern($1, proc_t, proc_t)
-
- typeattribute $1 can_dump_kernel;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_core_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow caller to read kernel messages
-## using the /proc/kmsg interface.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_read_messages',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_messages'($*)) dnl
-
- gen_require(`
- attribute can_receive_kernel_messages;
- type proc_kmsg_t, proc_t;
- ')
-
- read_files_pattern($1, proc_t, proc_kmsg_t)
-
- typeattribute $1 can_receive_kernel_messages;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_messages'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow caller to get the attributes of kernel message
-## interface (/proc/kmsg).
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_getattr_message_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_getattr_message_if'($*)) dnl
-
- gen_require(`
- type proc_kmsg_t, proc_t;
- ')
-
- getattr_files_pattern($1, proc_t, proc_kmsg_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_getattr_message_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts by caller to get the attributes of kernel
-## message interfaces.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_getattr_message_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_getattr_message_if'($*)) dnl
-
- gen_require(`
- type proc_kmsg_t;
- ')
-
- dontaudit $1 proc_kmsg_t:file getattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_getattr_message_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Mount on kernel message interfaces files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_mounton_message_if',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_mounton_message_if'($*)) dnl
-
- gen_require(`
- type proc_t, proc_kmsg_t;
- ')
-
- allow $1 proc_t:dir list_dir_perms;
- allow $1 proc_kmsg_t:file { getattr mounton };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_mounton_message_if'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to search the network
-## state directory.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`kernel_dontaudit_search_network_state',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_search_network_state'($*)) dnl
-
- gen_require(`
- type proc_net_t;
- ')
-
- dontaudit $1 proc_net_t:dir search;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_search_network_state'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow searching of network state directory.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_search_network_state',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_search_network_state'($*)) dnl
-
- gen_require(`
- type proc_t, proc_net_t;
- ')
-
- search_dirs_pattern($1, proc_t, proc_net_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_search_network_state'($*)) dnl
- ')
-
-
-########################################
-##
-## Read the network state information.
-##
-##
-##
-## Allow the specified domain to read the networking
-## state information. This includes several pieces
-## of networking information, such as network interface
-## names, netfilter (iptables) statistics, protocol
-## information, routes, and remote procedure call (RPC)
-## information.
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-#
- define(`kernel_read_network_state',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_network_state'($*)) dnl
-
- gen_require(`
- type proc_t, proc_net_t;
- ')
-
- read_files_pattern($1, { proc_t proc_net_t }, proc_net_t)
- read_lnk_files_pattern($1, { proc_t proc_net_t }, proc_net_t)
-
- list_dirs_pattern($1, proc_t, proc_net_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_network_state'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow caller to read the network state symbolic links.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_read_network_state_symlinks',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_network_state_symlinks'($*)) dnl
-
- gen_require(`
- type proc_t, proc_net_t;
- ')
-
- read_lnk_files_pattern($1, { proc_t proc_net_t }, proc_net_t)
-
- list_dirs_pattern($1, proc_t, proc_net_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_network_state_symlinks'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow searching of xen state directory.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_search_xen_state',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_search_xen_state'($*)) dnl
-
- gen_require(`
- type proc_t, proc_xen_t;
- ')
-
- search_dirs_pattern($1, proc_t, proc_xen_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_search_xen_state'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to search the xen
-## state directory.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`kernel_dontaudit_search_xen_state',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_search_xen_state'($*)) dnl
-
- gen_require(`
- type proc_xen_t;
- ')
-
- dontaudit $1 proc_xen_t:dir search;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_search_xen_state'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow caller to read the xen state information.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_read_xen_state',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_xen_state'($*)) dnl
-
- gen_require(`
- type proc_t, proc_xen_t;
- ')
-
- read_files_pattern($1, { proc_t proc_xen_t }, proc_xen_t)
- read_lnk_files_pattern($1, { proc_t proc_xen_t }, proc_xen_t)
-
- list_dirs_pattern($1, proc_t, proc_xen_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_xen_state'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow caller to read the xen state symbolic links.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_read_xen_state_symlinks',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_xen_state_symlinks'($*)) dnl
-
- gen_require(`
- type proc_t, proc_xen_t;
- ')
-
- read_lnk_files_pattern($1, { proc_t proc_xen_t }, proc_xen_t)
-
- list_dirs_pattern($1, proc_t, proc_xen_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_xen_state_symlinks'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow caller to write xen state information.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_write_xen_state',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_write_xen_state'($*)) dnl
-
- gen_require(`
- type proc_t, proc_xen_t;
- ')
-
- write_files_pattern($1, { proc_t proc_xen_t }, proc_xen_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_write_xen_state'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow attempts to list all proc directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_list_all_proc',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_list_all_proc'($*)) dnl
-
- gen_require(`
- attribute proc_type;
- ')
-
- allow $1 proc_type:dir list_dir_perms;
- allow $1 proc_type:file getattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_list_all_proc'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to list all proc directories.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_list_all_proc',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_list_all_proc'($*)) dnl
-
- gen_require(`
- attribute proc_type;
- ')
-
- dontaudit $1 proc_type:dir list_dir_perms;
- dontaudit $1 proc_type:file getattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_list_all_proc'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts by caller to search
-## the base directory of sysctls.
-##
-##
-##
-## Domain to not audit.
-##
-##
-##
-#
- define(`kernel_dontaudit_search_sysctl',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_search_sysctl'($*)) dnl
-
- gen_require(`
- type sysctl_t;
- ')
-
- dontaudit $1 sysctl_t:dir search;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_search_sysctl'($*)) dnl
- ')
-
-
-########################################
-##
-## Mount on sysctl_t dirs.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_mounton_sysctl_dirs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_mounton_sysctl_dirs'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_t;
- ')
-
- allow $1 proc_t:dir list_dir_perms;
- allow $1 sysctl_t:dir { getattr mounton };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_mounton_sysctl_dirs'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow access to read sysctl directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_read_sysctl',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_sysctl'($*)) dnl
-
- gen_require(`
- type sysctl_t, proc_t;
- ')
-
- list_dirs_pattern($1, proc_t, sysctl_t)
- read_files_pattern($1, sysctl_t, sysctl_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_sysctl'($*)) dnl
- ')
-
-
-########################################
-##
-## Mount on sysctl files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_mounton_sysctl_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_mounton_sysctl_files'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_t;
- ')
-
- allow $1 { proc_t sysctl_t }:dir list_dir_perms;
- allow $1 sysctl_t:file { getattr mounton };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_mounton_sysctl_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow caller to read the device sysctls.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_read_device_sysctls',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_device_sysctls'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_t, sysctl_dev_t;
- ')
-
- read_files_pattern($1, { proc_t sysctl_t sysctl_dev_t }, sysctl_dev_t)
-
- list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_dev_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_device_sysctls'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write device sysctls.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_rw_device_sysctls',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_rw_device_sysctls'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_t, sysctl_dev_t;
- ')
-
- rw_files_pattern($1, { proc_t sysctl_t sysctl_dev_t }, sysctl_dev_t)
-
- list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_dev_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_rw_device_sysctls'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow caller to search virtual memory sysctls.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_search_vm_sysctl',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_search_vm_sysctl'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_t, sysctl_vm_t;
- ')
-
- search_dirs_pattern($1, { proc_t sysctl_t }, sysctl_vm_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_search_vm_sysctl'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow caller to read virtual memory sysctls.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_read_vm_sysctls',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_vm_sysctls'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_t, sysctl_vm_t;
- ')
-
- read_files_pattern($1, { proc_t sysctl_t sysctl_vm_t }, sysctl_vm_t)
-
- list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_vm_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_vm_sysctls'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write virtual memory sysctls.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_rw_vm_sysctls',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_rw_vm_sysctls'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_t, sysctl_vm_t;
- ')
-
- rw_files_pattern($1 ,{ proc_t sysctl_t sysctl_vm_t }, sysctl_vm_t)
- list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_vm_t)
-
- # hal needs this
- allow $1 sysctl_vm_t:dir write;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_rw_vm_sysctls'($*)) dnl
- ')
-
-
-########################################
-##
-## Search network sysctl directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_search_network_sysctl',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_search_network_sysctl'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_t, sysctl_net_t;
- ')
-
- search_dirs_pattern($1, { proc_t sysctl_t }, sysctl_net_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_search_network_sysctl'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts by caller to search network sysctl directories.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_search_network_sysctl',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_search_network_sysctl'($*)) dnl
-
- gen_require(`
- type sysctl_net_t;
- ')
-
- dontaudit $1 sysctl_net_t:dir search;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_search_network_sysctl'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow caller to read network sysctls.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_read_net_sysctls',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_net_sysctls'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_t, sysctl_net_t;
- ')
-
- read_files_pattern($1, { proc_t sysctl_t sysctl_net_t }, sysctl_net_t)
-
- list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_net_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_net_sysctls'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow caller to modiry contents of sysctl network files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_rw_net_sysctls',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_rw_net_sysctls'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_t, sysctl_net_t;
- ')
-
- rw_files_pattern($1, { proc_t sysctl_t sysctl_net_t }, sysctl_net_t)
-
- list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_net_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_rw_net_sysctls'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow caller to read unix domain
-## socket sysctls.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_read_unix_sysctls',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_unix_sysctls'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_t, sysctl_net_t, sysctl_net_unix_t;
- ')
-
- read_files_pattern($1, { proc_t sysctl_t sysctl_net_t }, sysctl_net_unix_t)
-
- list_dirs_pattern($1, { proc_t sysctl_t }, { sysctl_net_t sysctl_net_unix_t })
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_unix_sysctls'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write unix domain
-## socket sysctls.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_rw_unix_sysctls',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_rw_unix_sysctls'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_t, sysctl_net_t, sysctl_net_unix_t;
- ')
-
- rw_files_pattern($1, { proc_t sysctl_t sysctl_net_t }, sysctl_net_unix_t)
-
- list_dirs_pattern($1, { proc_t sysctl_t }, { sysctl_net_t sysctl_net_unix_t })
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_rw_unix_sysctls'($*)) dnl
- ')
-
-
-########################################
-##
-## Read the hotplug sysctl.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_read_hotplug_sysctls',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_hotplug_sysctls'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_t, sysctl_kernel_t, sysctl_hotplug_t;
- ')
-
- read_files_pattern($1, { proc_t sysctl_t sysctl_kernel_t }, sysctl_hotplug_t)
-
- list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_kernel_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_hotplug_sysctls'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write the hotplug sysctl.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_rw_hotplug_sysctls',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_rw_hotplug_sysctls'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_t, sysctl_kernel_t, sysctl_hotplug_t;
- ')
-
- rw_files_pattern($1, { proc_t sysctl_t sysctl_kernel_t }, sysctl_hotplug_t)
-
- list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_kernel_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_rw_hotplug_sysctls'($*)) dnl
- ')
-
-
-########################################
-##
-## Read the modprobe sysctl.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_read_modprobe_sysctls',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_modprobe_sysctls'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_t, sysctl_kernel_t, sysctl_modprobe_t;
- ')
-
- read_files_pattern($1, { proc_t sysctl_t sysctl_kernel_t }, sysctl_modprobe_t)
-
- list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_kernel_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_modprobe_sysctls'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write the modprobe sysctl.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_rw_modprobe_sysctls',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_rw_modprobe_sysctls'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_t, sysctl_kernel_t, sysctl_modprobe_t;
- ')
-
- rw_files_pattern($1, { proc_t sysctl_t sysctl_kernel_t }, sysctl_modprobe_t)
-
- list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_kernel_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_rw_modprobe_sysctls'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to search generic kernel sysctls.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_search_kernel_sysctl',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_search_kernel_sysctl'($*)) dnl
-
- gen_require(`
- type sysctl_kernel_t;
- ')
-
- dontaudit $1 sysctl_kernel_t:dir search;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_search_kernel_sysctl'($*)) dnl
- ')
-
-
-#######################################
-##
-## Do not audit attempted reading of kernel sysctls
-##
-##
-##
-## Domain to not audit accesses from
-##
-##
-#
- define(`kernel_dontaudit_read_kernel_sysctl',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_read_kernel_sysctl'($*)) dnl
-
- gen_require(`
- type sysctl_kernel_t;
- ')
-
- dontaudit $1 sysctl_kernel_t:file read_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_read_kernel_sysctl'($*)) dnl
- ')
-
-
-########################################
-##
-## Read generic crypto sysctls.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_read_crypto_sysctls',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_crypto_sysctls'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_t, sysctl_crypto_t;
- ')
-
- read_files_pattern($1, { proc_t sysctl_t sysctl_crypto_t }, sysctl_crypto_t)
- list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_crypto_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_crypto_sysctls'($*)) dnl
- ')
-
-
-########################################
-##
-## Read general kernel sysctls.
-##
-##
-##
-## Allow the specified domain to read general
-## kernel sysctl settings. These settings are typically
-## read using the sysctl program. The settings
-## that are included by this interface are prefixed
-## with "kernel.", for example, kernel.sysrq.
-##
-##
-## This does not include access to the hotplug
-## handler setting (kernel.hotplug)
-## nor the module installer handler setting
-## (kernel.modprobe).
-##
-##
-## Related interfaces:
-##
-##
-## - kernel_rw_kernel_sysctl()
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_read_kernel_sysctls',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_kernel_sysctls'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_t, sysctl_kernel_t;
- ')
-
- read_files_pattern($1, { proc_t sysctl_t sysctl_kernel_t }, sysctl_kernel_t)
-
- list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_kernel_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_kernel_sysctls'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to write generic kernel sysctls.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_write_kernel_sysctl',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_write_kernel_sysctl'($*)) dnl
-
- gen_require(`
- type sysctl_kernel_t;
- ')
-
- dontaudit $1 sysctl_kernel_t:file write;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_write_kernel_sysctl'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write generic kernel sysctls.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_rw_kernel_sysctl',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_rw_kernel_sysctl'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_t, sysctl_kernel_t;
- ')
-
- rw_files_pattern($1, { proc_t sysctl_t sysctl_kernel_t }, sysctl_kernel_t)
-
- list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_kernel_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_rw_kernel_sysctl'($*)) dnl
- ')
-
-
-#######################################
-##
-## Mount on kernel sysctl files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_mounton_kernel_sysctl_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_mounton_kernel_sysctl_files'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_t, sysctl_kernel_t;
- ')
-
- allow $1 { proc_t sysctl_t sysctl_kernel_t }:dir list_dir_perms;
- allow $1 sysctl_kernel_t:file { getattr mounton };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_mounton_kernel_sysctl_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Read kernel ns lastpid sysctls.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_read_kernel_ns_lastpid_sysctls',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_kernel_ns_lastpid_sysctls'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_t, sysctl_kernel_ns_last_pid_t;
- ')
-
- read_files_pattern($1, { proc_t sysctl_t sysctl_kernel_ns_last_pid_t }, sysctl_kernel_ns_last_pid_t)
-
- list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_kernel_ns_last_pid_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_kernel_ns_lastpid_sysctls'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to write kernel ns lastpid sysctls.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_write_kernel_ns_lastpid_sysctl',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_write_kernel_ns_lastpid_sysctl'($*)) dnl
-
- gen_require(`
- type sysctl_kernel_ns_last_pid_t;
- ')
-
- dontaudit $1 sysctl_kernel_ns_last_pid_t:file write;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_write_kernel_ns_lastpid_sysctl'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write kernel ns lastpid sysctls.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_rw_kernel_ns_lastpid_sysctl',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_rw_kernel_ns_lastpid_sysctl'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_t, sysctl_kernel_ns_last_pid_t;
- ')
-
- rw_files_pattern($1, { proc_t sysctl_t sysctl_kernel_ns_last_pid_t }, sysctl_kernel_ns_last_pid_t)
-
- list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_kernel_ns_last_pid_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_rw_kernel_ns_lastpid_sysctl'($*)) dnl
- ')
-
-
-########################################
-##
-## Search filesystem sysctl directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_search_fs_sysctls',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_search_fs_sysctls'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_t, sysctl_fs_t;
- ')
-
- search_dirs_pattern($1, { proc_t sysctl_t sysctl_fs_t }, sysctl_fs_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_search_fs_sysctls'($*)) dnl
- ')
-
-
-########################################
-##
-## Read filesystem sysctls.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_read_fs_sysctls',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_fs_sysctls'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_t, sysctl_fs_t;
- ')
-
- read_files_pattern($1, { proc_t sysctl_t sysctl_fs_t }, sysctl_fs_t)
-
- list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_fs_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_fs_sysctls'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write fileystem sysctls.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_rw_fs_sysctls',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_rw_fs_sysctls'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_t, sysctl_fs_t;
- ')
-
- rw_files_pattern($1, { proc_t sysctl_t sysctl_fs_t }, sysctl_fs_t)
-
- list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_fs_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_rw_fs_sysctls'($*)) dnl
- ')
-
-
-########################################
-##
-## Read IRQ sysctls.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_read_irq_sysctls',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_irq_sysctls'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_irq_t;
- ')
-
- read_files_pattern($1, { proc_t sysctl_irq_t }, sysctl_irq_t)
-
- list_dirs_pattern($1, proc_t, sysctl_irq_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_irq_sysctls'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write IRQ sysctls.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_rw_irq_sysctls',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_rw_irq_sysctls'($*)) dnl
-
- gen_require(`
- type proc_t, sysctl_irq_t;
- ')
-
- rw_files_pattern($1, { proc_t sysctl_irq_t }, sysctl_irq_t)
-
- list_dirs_pattern($1, proc_t, sysctl_irq_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_rw_irq_sysctls'($*)) dnl
- ')
-
-
-########################################
-##
-## Read RPC sysctls.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_read_rpc_sysctls',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_rpc_sysctls'($*)) dnl
-
- gen_require(`
- type proc_t, proc_net_t, sysctl_rpc_t;
- ')
-
- read_files_pattern($1, { proc_t proc_net_t sysctl_rpc_t }, sysctl_rpc_t)
-
- list_dirs_pattern($1, { proc_t proc_net_t }, sysctl_rpc_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_rpc_sysctls'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write RPC sysctls.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_rw_rpc_sysctls',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_rw_rpc_sysctls'($*)) dnl
-
- gen_require(`
- type proc_t, proc_net_t, sysctl_rpc_t;
- ')
-
- rw_files_pattern($1, { proc_t proc_net_t sysctl_rpc_t }, sysctl_rpc_t)
-
- list_dirs_pattern($1, { proc_t proc_net_t }, sysctl_rpc_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_rw_rpc_sysctls'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to list all sysctl directories.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_list_all_sysctls',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_list_all_sysctls'($*)) dnl
-
- gen_require(`
- attribute sysctl_type;
- ')
-
- dontaudit $1 sysctl_type:dir list_dir_perms;
- dontaudit $1 sysctl_type:file getattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_list_all_sysctls'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow caller to read all sysctls.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_read_all_sysctls',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_all_sysctls'($*)) dnl
-
- gen_require(`
- attribute sysctl_type;
- type proc_t, proc_net_t;
- ')
-
- # proc_net_t for /proc/net/rpc sysctls
- read_files_pattern($1, { proc_t proc_net_t sysctl_type }, sysctl_type)
-
- list_dirs_pattern($1, { proc_t proc_net_t }, sysctl_type)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_all_sysctls'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write all sysctls.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_rw_all_sysctls',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_rw_all_sysctls'($*)) dnl
-
- gen_require(`
- attribute sysctl_type;
- type proc_t, proc_net_t;
- ')
-
- # proc_net_t for /proc/net/rpc sysctls
- rw_files_pattern($1, { proc_t proc_net_t sysctl_type }, sysctl_type)
-
- allow $1 sysctl_type:dir list_dir_perms;
- # why is setattr needed?
- allow $1 sysctl_type:file setattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_rw_all_sysctls'($*)) dnl
- ')
-
-
-########################################
-##
-## Send a kill signal to unlabeled processes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_kill_unlabeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_kill_unlabeled'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:process sigkill;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_kill_unlabeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Mount a kernel unlabeled filesystem.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_mount_unlabeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_mount_unlabeled'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:filesystem mount;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_mount_unlabeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Unmount a kernel unlabeled filesystem.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_unmount_unlabeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_unmount_unlabeled'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:filesystem unmount;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_unmount_unlabeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Send general signals to unlabeled processes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_signal_unlabeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_signal_unlabeled'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:process signal;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_signal_unlabeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Send a null signal to unlabeled processes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_signull_unlabeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_signull_unlabeled'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:process signull;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_signull_unlabeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Send a stop signal to unlabeled processes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_sigstop_unlabeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_sigstop_unlabeled'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:process sigstop;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_sigstop_unlabeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Send a child terminated signal to unlabeled processes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_sigchld_unlabeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_sigchld_unlabeled'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:process sigchld;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_sigchld_unlabeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Get the attributes of unlabeled directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_getattr_unlabeled_dirs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_getattr_unlabeled_dirs'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:dir getattr_dir_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_getattr_unlabeled_dirs'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to search unlabeled directories.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_search_unlabeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_search_unlabeled'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- dontaudit $1 unlabeled_t:dir search_dir_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_search_unlabeled'($*)) dnl
- ')
-
-
-########################################
-##
-## List unlabeled directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_list_unlabeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_list_unlabeled'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:dir list_dir_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_list_unlabeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Read the process state (/proc/pid) of all unlabeled_t.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_read_unlabeled_state',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_unlabeled_state'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:dir list_dir_perms;
- read_files_pattern($1, unlabeled_t, unlabeled_t)
- read_lnk_files_pattern($1, unlabeled_t, unlabeled_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_unlabeled_state'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to list unlabeled directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_dontaudit_list_unlabeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_list_unlabeled'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- dontaudit $1 unlabeled_t:dir list_dir_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_list_unlabeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write unlabeled directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_rw_unlabeled_dirs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_rw_unlabeled_dirs'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:dir rw_dir_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_rw_unlabeled_dirs'($*)) dnl
- ')
-
-
-########################################
-##
-## Delete unlabeled directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_delete_unlabeled_dirs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_delete_unlabeled_dirs'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:dir delete_dir_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_delete_unlabeled_dirs'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete unlabeled directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_manage_unlabeled_dirs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_manage_unlabeled_dirs'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:dir manage_dir_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_manage_unlabeled_dirs'($*)) dnl
- ')
-
-
-########################################
-##
-## Mount a filesystem on an unlabeled directory.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_mounton_unlabeled_dirs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_mounton_unlabeled_dirs'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:dir { search_dir_perms mounton };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_mounton_unlabeled_dirs'($*)) dnl
- ')
-
-
-########################################
-##
-## Read unlabeled files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_read_unlabeled_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_unlabeled_files'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:file read_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_unlabeled_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write unlabeled files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_rw_unlabeled_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_rw_unlabeled_files'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:file rw_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_rw_unlabeled_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Delete unlabeled files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_delete_unlabeled_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_delete_unlabeled_files'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:file delete_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_delete_unlabeled_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete unlabeled files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_manage_unlabeled_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_manage_unlabeled_files'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:file manage_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_manage_unlabeled_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts by caller to get the
-## attributes of an unlabeled file.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_getattr_unlabeled_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_getattr_unlabeled_files'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- dontaudit $1 unlabeled_t:file getattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_getattr_unlabeled_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts by caller to
-## read an unlabeled file.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_read_unlabeled_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_read_unlabeled_files'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- dontaudit $1 unlabeled_t:file { getattr read };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_read_unlabeled_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Delete unlabeled symbolic links.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_delete_unlabeled_symlinks',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_delete_unlabeled_symlinks'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- delete_lnk_files_pattern($1, unlabeled_t, unlabeled_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_delete_unlabeled_symlinks'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete unlabeled symbolic links.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_manage_unlabeled_symlinks',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_manage_unlabeled_symlinks'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:lnk_file manage_lnk_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_manage_unlabeled_symlinks'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts by caller to get the
-## attributes of unlabeled symbolic links.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_getattr_unlabeled_symlinks',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_getattr_unlabeled_symlinks'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- dontaudit $1 unlabeled_t:lnk_file getattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_getattr_unlabeled_symlinks'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts by caller to get the
-## attributes of unlabeled named pipes.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_getattr_unlabeled_pipes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_getattr_unlabeled_pipes'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- dontaudit $1 unlabeled_t:fifo_file getattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_getattr_unlabeled_pipes'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts by caller to get the
-## attributes of unlabeled named sockets.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_getattr_unlabeled_sockets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_getattr_unlabeled_sockets'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- dontaudit $1 unlabeled_t:sock_file getattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_getattr_unlabeled_sockets'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts by caller to get attributes for
-## unlabeled block devices.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_getattr_unlabeled_blk_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_getattr_unlabeled_blk_files'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- dontaudit $1 unlabeled_t:blk_file getattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_getattr_unlabeled_blk_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write unlabeled block device nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_rw_unlabeled_blk_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_rw_unlabeled_blk_files'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:blk_file rw_blk_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_rw_unlabeled_blk_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Delete unlabeled block device nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_delete_unlabeled_blk_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_delete_unlabeled_blk_files'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- delete_blk_files_pattern($1, unlabeled_t, unlabeled_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_delete_unlabeled_blk_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete unlabeled block device nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_manage_unlabeled_blk_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_manage_unlabeled_blk_files'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:blk_file manage_blk_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_manage_unlabeled_blk_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts by caller to get attributes for
-## unlabeled character devices.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_getattr_unlabeled_chr_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_getattr_unlabeled_chr_files'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- dontaudit $1 unlabeled_t:chr_file getattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_getattr_unlabeled_chr_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to
-## write unlabeled character devices.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_write_unlabeled_chr_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_write_unlabeled_chr_files'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- dontaudit $1 unlabeled_t:file write;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_write_unlabeled_chr_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Delete unlabeled character device nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_delete_unlabeled_chr_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_delete_unlabeled_chr_files'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- delete_chr_files_pattern($1, unlabeled_t, unlabeled_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_delete_unlabeled_chr_files'($*)) dnl
- ')
-
-
-
-########################################
-##
-## Create, read, write, and delete unlabeled character device nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_manage_unlabeled_chr_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_manage_unlabeled_chr_files'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:chr_file manage_chr_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_manage_unlabeled_chr_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow caller to relabel unlabeled directories.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_relabelfrom_unlabeled_dirs',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_relabelfrom_unlabeled_dirs'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:dir { list_dir_perms relabelfrom };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_relabelfrom_unlabeled_dirs'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow caller to relabel unlabeled files.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_relabelfrom_unlabeled_files',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_relabelfrom_unlabeled_files'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- kernel_list_unlabeled($1)
- allow $1 unlabeled_t:file { getattr relabelfrom };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_relabelfrom_unlabeled_files'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow caller to relabel unlabeled symbolic links.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_relabelfrom_unlabeled_symlinks',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_relabelfrom_unlabeled_symlinks'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- kernel_list_unlabeled($1)
- allow $1 unlabeled_t:lnk_file { getattr relabelfrom };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_relabelfrom_unlabeled_symlinks'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow caller to relabel unlabeled named pipes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_relabelfrom_unlabeled_pipes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_relabelfrom_unlabeled_pipes'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- kernel_list_unlabeled($1)
- allow $1 unlabeled_t:fifo_file { getattr relabelfrom };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_relabelfrom_unlabeled_pipes'($*)) dnl
- ')
-
-
-########################################
-##
-## Delete unlabeled named pipes
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_delete_unlabeled_pipes',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_delete_unlabeled_pipes'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- delete_fifo_files_pattern($1, unlabeled_t, unlabeled_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_delete_unlabeled_pipes'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow caller to relabel unlabeled named sockets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_relabelfrom_unlabeled_sockets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_relabelfrom_unlabeled_sockets'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- kernel_list_unlabeled($1)
- allow $1 unlabeled_t:sock_file { getattr relabelfrom };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_relabelfrom_unlabeled_sockets'($*)) dnl
- ')
-
-
-########################################
-##
-## Delete unlabeled named sockets.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_delete_unlabeled_sockets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_delete_unlabeled_sockets'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- delete_sock_files_pattern($1, unlabeled_t, unlabeled_t)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_delete_unlabeled_sockets'($*)) dnl
- ')
-
-########################################
-##
-## Send and receive messages from an
-## unlabeled IPSEC association.
-##
-##
-##
-## Send and receive messages from an
-## unlabeled IPSEC association. Network
-## connections that are not protected
-## by IPSEC have use an unlabeled
-## assocation.
-##
-##
-## The corenetwork interface
-## corenet_non_ipsec_sendrecv() should
-## be used instead of this one.
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_sendrecv_unlabeled_association',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_sendrecv_unlabeled_association'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:association { sendto recvfrom };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_sendrecv_unlabeled_association'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to send and receive messages
-## from an unlabeled IPSEC association.
-##
-##
-##
-## Do not audit attempts to send and receive messages
-## from an unlabeled IPSEC association. Network
-## connections that are not protected
-## by IPSEC have use an unlabeled
-## assocation.
-##
-##
-## The corenetwork interface
-## corenet_dontaudit_non_ipsec_sendrecv() should
-## be used instead of this one.
-##
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_sendrecv_unlabeled_association',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_sendrecv_unlabeled_association'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- dontaudit $1 unlabeled_t:association { sendto recvfrom };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_sendrecv_unlabeled_association'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive TCP packets from an unlabeled connection.
-##
-##
-##
-## Receive TCP packets from an unlabeled connection.
-##
-##
-## The corenetwork interface corenet_tcp_recv_unlabeled() should
-## be used instead of this one.
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_tcp_recvfrom_unlabeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_tcp_recvfrom_unlabeled'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:tcp_socket recvfrom;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_tcp_recvfrom_unlabeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive TCP packets from an unlabeled
-## connection.
-##
-##
-##
-## Do not audit attempts to receive TCP packets from an unlabeled
-## connection.
-##
-##
-## The corenetwork interface corenet_dontaudit_tcp_recv_unlabeled()
-## should be used instead of this one.
-##
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_tcp_recvfrom_unlabeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_tcp_recvfrom_unlabeled'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- dontaudit $1 unlabeled_t:tcp_socket recvfrom;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_tcp_recvfrom_unlabeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive UDP packets from an unlabeled connection.
-##
-##
-##
-## Receive UDP packets from an unlabeled connection.
-##
-##
-## The corenetwork interface corenet_udp_recv_unlabeled() should
-## be used instead of this one.
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_udp_recvfrom_unlabeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_udp_recvfrom_unlabeled'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:udp_socket recvfrom;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_udp_recvfrom_unlabeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive UDP packets from an unlabeled
-## connection.
-##
-##
-##
-## Do not audit attempts to receive UDP packets from an unlabeled
-## connection.
-##
-##
-## The corenetwork interface corenet_dontaudit_udp_recv_unlabeled()
-## should be used instead of this one.
-##
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_udp_recvfrom_unlabeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_udp_recvfrom_unlabeled'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- dontaudit $1 unlabeled_t:udp_socket recvfrom;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_udp_recvfrom_unlabeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive Raw IP packets from an unlabeled connection.
-##
-##
-##
-## Receive Raw IP packets from an unlabeled connection.
-##
-##
-## The corenetwork interface corenet_raw_recv_unlabeled() should
-## be used instead of this one.
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_raw_recvfrom_unlabeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_raw_recvfrom_unlabeled'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:rawip_socket recvfrom;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_raw_recvfrom_unlabeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive Raw IP packets from an unlabeled
-## connection.
-##
-##
-##
-## Do not audit attempts to receive Raw IP packets from an unlabeled
-## connection.
-##
-##
-## The corenetwork interface corenet_dontaudit_raw_recv_unlabeled()
-## should be used instead of this one.
-##
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_raw_recvfrom_unlabeled',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_raw_recvfrom_unlabeled'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- dontaudit $1 unlabeled_t:rawip_socket recvfrom;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_raw_recvfrom_unlabeled'($*)) dnl
- ')
-
-
-########################################
-##
-## Send and receive unlabeled packets.
-##
-##
-##
-## Send and receive unlabeled packets.
-## These packets do not match any netfilter
-## SECMARK rules.
-##
-##
-## The corenetwork interface
-## corenet_sendrecv_unlabeled_packets() should
-## be used instead of this one.
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_sendrecv_unlabeled_packets',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_sendrecv_unlabeled_packets'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:packet { send recv };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_sendrecv_unlabeled_packets'($*)) dnl
- ')
-
-
-########################################
-##
-## Receive packets from an unlabeled peer.
-##
-##
-##
-## Receive packets from an unlabeled peer, these packets do not have any
-## peer labeling information present.
-##
-##
-## The corenetwork interface corenet_recvfrom_unlabeled_peer() should
-## be used instead of this one.
-##
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_recvfrom_unlabeled_peer',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_recvfrom_unlabeled_peer'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:peer recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_recvfrom_unlabeled_peer'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to receive packets from an unlabeled peer.
-##
-##
-##
-## Do not audit attempts to receive packets from an unlabeled peer,
-## these packets do not have any peer labeling information present.
-##
-##
-## The corenetwork interface corenet_dontaudit_*_recvfrom_unlabeled()
-## should be used instead of this one.
-##
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`kernel_dontaudit_recvfrom_unlabeled_peer',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_recvfrom_unlabeled_peer'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- dontaudit $1 unlabeled_t:peer recv;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_dontaudit_recvfrom_unlabeled_peer'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel from unlabeled database objects.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_relabelfrom_unlabeled_database',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_relabelfrom_unlabeled_database'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- class db_database { setattr relabelfrom };
- class db_schema { setattr relabelfrom };
- class db_table { setattr relabelfrom };
- class db_sequence { setattr relabelfrom };
- class db_view { setattr relabelfrom };
- class db_procedure { setattr relabelfrom };
- class db_language { setattr relabelfrom };
- class db_column { setattr relabelfrom };
- class db_tuple { update relabelfrom };
- class db_blob { setattr relabelfrom };
- ')
-
- allow $1 unlabeled_t:db_database { setattr relabelfrom };
- allow $1 unlabeled_t:db_schema { setattr relabelfrom };
- allow $1 unlabeled_t:db_table { setattr relabelfrom };
- allow $1 unlabeled_t:db_sequence { setattr relabelfrom };
- allow $1 unlabeled_t:db_view { setattr relabelfrom };
- allow $1 unlabeled_t:db_procedure { setattr relabelfrom };
- allow $1 unlabeled_t:db_language { setattr relabelfrom };
- allow $1 unlabeled_t:db_column { setattr relabelfrom };
- allow $1 unlabeled_t:db_tuple { update relabelfrom };
- allow $1 unlabeled_t:db_blob { setattr relabelfrom };
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_relabelfrom_unlabeled_database'($*)) dnl
- ')
-
-
-########################################
-##
-## Unconfined access to kernel module resources.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_unconfined',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_unconfined'($*)) dnl
-
- gen_require(`
- attribute kern_unconfined;
- ')
-
- typeattribute $1 kern_unconfined;
- kernel_load_module($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_unconfined'($*)) dnl
- ')
-
-
-########################################
-##
-## Read virtual memory overcommit sysctl.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_read_vm_overcommit_sysctl',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_read_vm_overcommit_sysctl'($*)) dnl
-
- gen_require(`
- type sysctl_vm_overcommit_t;
- ')
-
- kernel_search_vm_sysctl($1)
- allow $1 sysctl_vm_overcommit_t:file read_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_read_vm_overcommit_sysctl'($*)) dnl
- ')
-
-
-########################################
-##
-## Read and write virtual memory overcommit sysctl.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-#
- define(`kernel_rw_vm_overcommit_sysctl',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_rw_vm_overcommit_sysctl'($*)) dnl
-
- gen_require(`
- type sysctl_vm_overcommit_t;
- ')
-
- kernel_search_vm_sysctl($1)
- allow $1 sysctl_vm_overcommit_t:file rw_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_rw_vm_overcommit_sysctl'($*)) dnl
- ')
-
-
-########################################
-##
-## Access unlabeled infiniband pkeys.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_ib_access_unlabeled_pkeys',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_ib_access_unlabeled_pkeys'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:infiniband_pkey access;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_ib_access_unlabeled_pkeys'($*)) dnl
- ')
-
-
-########################################
-##
-## Manage subnet on unlabeled Infiniband endports.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`kernel_ib_manage_subnet_unlabeled_endports',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `kernel_ib_manage_subnet_unlabeled_endports'($*)) dnl
-
- gen_require(`
- type unlabeled_t;
- ')
-
- allow $1 unlabeled_t:infiniband_endport manage_subnet;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `kernel_ib_manage_subnet_unlabeled_endports'($*)) dnl
- ')
-
-
-## Policy controlling access to storage devices
-
-########################################
-##
-## Allow the caller to get the attributes of fixed disk
-## device nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_getattr_fixed_disk_dev',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_getattr_fixed_disk_dev'($*)) dnl
-
- gen_require(`
- type fixed_disk_device_t;
- ')
-
- dev_list_all_dev_nodes($1)
- allow $1 fixed_disk_device_t:blk_file getattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_getattr_fixed_disk_dev'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts made by the caller to get
-## the attributes of fixed disk device nodes.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`storage_dontaudit_getattr_fixed_disk_dev',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_dontaudit_getattr_fixed_disk_dev'($*)) dnl
-
- gen_require(`
- type fixed_disk_device_t;
- ')
-
- dontaudit $1 fixed_disk_device_t:blk_file getattr;
- dontaudit $1 fixed_disk_device_t:chr_file getattr; # /dev/rawctl
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_dontaudit_getattr_fixed_disk_dev'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow the caller to set the attributes of fixed disk
-## device nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_setattr_fixed_disk_dev',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_setattr_fixed_disk_dev'($*)) dnl
-
- gen_require(`
- type fixed_disk_device_t;
- ')
-
- dev_list_all_dev_nodes($1)
- allow $1 fixed_disk_device_t:blk_file setattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_setattr_fixed_disk_dev'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts made by the caller to set
-## the attributes of fixed disk device nodes.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`storage_dontaudit_setattr_fixed_disk_dev',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_dontaudit_setattr_fixed_disk_dev'($*)) dnl
-
- gen_require(`
- type fixed_disk_device_t;
- ')
-
- dontaudit $1 fixed_disk_device_t:blk_file setattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_dontaudit_setattr_fixed_disk_dev'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow the caller to directly read from a fixed disk.
-## This is extremely dangerous as it can bypass the
-## SELinux protections for filesystem objects, and
-## should only be used by trusted domains.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_raw_read_fixed_disk',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_raw_read_fixed_disk'($*)) dnl
-
- gen_require(`
- attribute fixed_disk_raw_read;
- type fixed_disk_device_t;
- ')
-
- dev_list_all_dev_nodes($1)
- allow $1 fixed_disk_device_t:blk_file read_blk_file_perms;
- allow $1 fixed_disk_device_t:chr_file read_chr_file_perms;
- typeattribute $1 fixed_disk_raw_read;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_raw_read_fixed_disk'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow the caller to directly read from a fixed disk
-## if a tunable is set.
-## This is extremely dangerous as it can bypass the
-## SELinux protections for filesystem objects, and
-## should only be used by trusted domains.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Tunable to depend on
-##
-##
-#
- define(`storage_raw_read_fixed_disk_cond',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_raw_read_fixed_disk_cond'($*)) dnl
-
- gen_require(`
- attribute fixed_disk_raw_read;
- type fixed_disk_device_t;
- ')
-
- typeattribute $1 fixed_disk_raw_read;
- tunable_policy($2, `
- dev_list_all_dev_nodes($1)
- allow $1 fixed_disk_device_t:blk_file read_blk_file_perms;
- allow $1 fixed_disk_device_t:chr_file read_chr_file_perms;
- ')
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_raw_read_fixed_disk_cond'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts made by the caller to read
-## fixed disk device nodes.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`storage_dontaudit_read_fixed_disk',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_dontaudit_read_fixed_disk'($*)) dnl
-
- gen_require(`
- type fixed_disk_device_t;
-
- ')
-
- dontaudit $1 fixed_disk_device_t:blk_file read_blk_file_perms;
- dontaudit $1 fixed_disk_device_t:chr_file read_chr_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_dontaudit_read_fixed_disk'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow the caller to directly write to a fixed disk.
-## This is extremely dangerous as it can bypass the
-## SELinux protections for filesystem objects, and
-## should only be used by trusted domains.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_raw_write_fixed_disk',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_raw_write_fixed_disk'($*)) dnl
-
- gen_require(`
- attribute fixed_disk_raw_write;
- type fixed_disk_device_t;
- ')
-
- dev_list_all_dev_nodes($1)
- allow $1 fixed_disk_device_t:blk_file write_blk_file_perms;
- allow $1 fixed_disk_device_t:chr_file write_chr_file_perms;
- typeattribute $1 fixed_disk_raw_write;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_raw_write_fixed_disk'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts made by the caller to write
-## fixed disk device nodes.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`storage_dontaudit_write_fixed_disk',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_dontaudit_write_fixed_disk'($*)) dnl
-
- gen_require(`
- type fixed_disk_device_t;
-
- ')
-
- dontaudit $1 fixed_disk_device_t:blk_file write_blk_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_dontaudit_write_fixed_disk'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow the caller to directly read and write to a fixed disk.
-## This is extremely dangerous as it can bypass the
-## SELinux protections for filesystem objects, and
-## should only be used by trusted domains.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_raw_rw_fixed_disk',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_raw_rw_fixed_disk'($*)) dnl
-
- storage_raw_read_fixed_disk($1)
- storage_raw_write_fixed_disk($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_raw_rw_fixed_disk'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow the caller to create fixed disk device nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_create_fixed_disk_dev',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_create_fixed_disk_dev'($*)) dnl
-
- gen_require(`
- type fixed_disk_device_t;
- ')
-
- allow $1 self:capability mknod;
- allow $1 fixed_disk_device_t:blk_file create_blk_file_perms;
- dev_add_entry_generic_dirs($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_create_fixed_disk_dev'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow the caller to delete fixed disk device nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_delete_fixed_disk_dev',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_delete_fixed_disk_dev'($*)) dnl
-
- gen_require(`
- type fixed_disk_device_t;
- ')
-
- allow $1 fixed_disk_device_t:blk_file delete_blk_file_perms;
- dev_remove_entry_generic_dirs($1)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_delete_fixed_disk_dev'($*)) dnl
- ')
-
-
-########################################
-##
-## Create, read, write, and delete fixed disk device nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_manage_fixed_disk',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_manage_fixed_disk'($*)) dnl
-
- gen_require(`
- attribute fixed_disk_raw_read, fixed_disk_raw_write;
- type fixed_disk_device_t;
- ')
-
- dev_list_all_dev_nodes($1)
- allow $1 self:capability mknod;
- allow $1 fixed_disk_device_t:blk_file manage_blk_file_perms;
- allow $1 fixed_disk_device_t:chr_file manage_chr_file_perms;
- typeattribute $1 fixed_disk_raw_read, fixed_disk_raw_write;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_manage_fixed_disk'($*)) dnl
- ')
-
-
-########################################
-##
-## Create block devices in /dev with the fixed disk type
-## via an automatic type transition.
-##
-##
-##
-## Domain allowed access.
-##
-##
-##
-##
-## Optional filename of the block device to be created
-##
-##
-#
- define(`storage_dev_filetrans_fixed_disk',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_dev_filetrans_fixed_disk'($*)) dnl
-
- gen_require(`
- type fixed_disk_device_t;
- ')
-
- dev_filetrans($1, fixed_disk_device_t, blk_file, $2)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_dev_filetrans_fixed_disk'($*)) dnl
- ')
-
-
-########################################
-##
-## Create block devices in on a tmpfs filesystem with the
-## fixed disk type via an automatic type transition.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_tmpfs_filetrans_fixed_disk',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_tmpfs_filetrans_fixed_disk'($*)) dnl
-
- gen_require(`
- type fixed_disk_device_t;
- ')
-
- fs_tmpfs_filetrans($1, fixed_disk_device_t, blk_file)
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_tmpfs_filetrans_fixed_disk'($*)) dnl
- ')
-
-
-########################################
-##
-## Relabel fixed disk device nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_relabel_fixed_disk',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_relabel_fixed_disk'($*)) dnl
-
- gen_require(`
- type fixed_disk_device_t;
- ')
-
- dev_list_all_dev_nodes($1)
- allow $1 fixed_disk_device_t:blk_file relabel_blk_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_relabel_fixed_disk'($*)) dnl
- ')
-
-
-########################################
-##
-## Enable a fixed disk device as swap space
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_swapon_fixed_disk',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_swapon_fixed_disk'($*)) dnl
-
- gen_require(`
- type fixed_disk_device_t;
- ')
-
- dev_list_all_dev_nodes($1)
- allow $1 fixed_disk_device_t:blk_file getattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_swapon_fixed_disk'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow the caller to get the attributes
-## of device nodes of fuse devices.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_getattr_fuse_dev',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_getattr_fuse_dev'($*)) dnl
-
- gen_require(`
- type fuse_device_t;
- ')
-
- dev_list_all_dev_nodes($1)
- allow $1 fuse_device_t:chr_file getattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_getattr_fuse_dev'($*)) dnl
- ')
-
-
-########################################
-##
-## read or write fuse device interfaces.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_rw_fuse',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_rw_fuse'($*)) dnl
-
- gen_require(`
- type fuse_device_t;
- ')
-
- allow $1 fuse_device_t:chr_file rw_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_rw_fuse'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to read or write
-## fuse device interfaces.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`storage_dontaudit_rw_fuse',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_dontaudit_rw_fuse'($*)) dnl
-
- gen_require(`
- type fuse_device_t;
- ')
-
- dontaudit $1 fuse_device_t:chr_file rw_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_dontaudit_rw_fuse'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow the caller to get the attributes of
-## the generic SCSI interface device nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_getattr_scsi_generic_dev',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_getattr_scsi_generic_dev'($*)) dnl
-
- gen_require(`
- type scsi_generic_device_t;
- ')
-
- dev_list_all_dev_nodes($1)
- allow $1 scsi_generic_device_t:chr_file getattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_getattr_scsi_generic_dev'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow the caller to set the attributes of
-## the generic SCSI interface device nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_setattr_scsi_generic_dev',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_setattr_scsi_generic_dev'($*)) dnl
-
- gen_require(`
- type scsi_generic_device_t;
- ')
-
- dev_list_all_dev_nodes($1)
- allow $1 scsi_generic_device_t:chr_file setattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_setattr_scsi_generic_dev'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow the caller to directly read, in a
-## generic fashion, from any SCSI device.
-## This is extremely dangerous as it can bypass the
-## SELinux protections for filesystem objects, and
-## should only be used by trusted domains.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_read_scsi_generic',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_read_scsi_generic'($*)) dnl
-
- gen_require(`
- attribute scsi_generic_read;
- type scsi_generic_device_t;
- ')
-
- dev_list_all_dev_nodes($1)
- allow $1 scsi_generic_device_t:chr_file read_chr_file_perms;
- typeattribute $1 scsi_generic_read;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_read_scsi_generic'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow the caller to directly write, in a
-## generic fashion, from any SCSI device.
-## This is extremely dangerous as it can bypass the
-## SELinux protections for filesystem objects, and
-## should only be used by trusted domains.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_write_scsi_generic',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_write_scsi_generic'($*)) dnl
-
- gen_require(`
- attribute scsi_generic_write;
- type scsi_generic_device_t;
- ')
-
- dev_list_all_dev_nodes($1)
- allow $1 scsi_generic_device_t:chr_file write_chr_file_perms;
- typeattribute $1 scsi_generic_write;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_write_scsi_generic'($*)) dnl
- ')
-
-
-########################################
-##
-## Set attributes of the device nodes
-## for the SCSI generic inerface.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_setattr_scsi_generic_dev_dev',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_setattr_scsi_generic_dev_dev'($*)) dnl
-
- gen_require(`
- type scsi_generic_device_t;
- ')
-
- dev_list_all_dev_nodes($1)
- allow $1 scsi_generic_device_t:chr_file setattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_setattr_scsi_generic_dev_dev'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to read or write
-## SCSI generic device interfaces.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`storage_dontaudit_rw_scsi_generic',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_dontaudit_rw_scsi_generic'($*)) dnl
-
- gen_require(`
- type scsi_generic_device_t;
- ')
-
- dontaudit $1 scsi_generic_device_t:chr_file rw_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_dontaudit_rw_scsi_generic'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow the caller to get the attributes of removable
-## devices device nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_getattr_removable_dev',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_getattr_removable_dev'($*)) dnl
-
- gen_require(`
- type removable_device_t;
- ')
-
- dev_list_all_dev_nodes($1)
- allow $1 removable_device_t:blk_file getattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_getattr_removable_dev'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts made by the caller to get
-## the attributes of removable devices device nodes.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`storage_dontaudit_getattr_removable_dev',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_dontaudit_getattr_removable_dev'($*)) dnl
-
- gen_require(`
- type removable_device_t;
- ')
-
- dontaudit $1 removable_device_t:blk_file getattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_dontaudit_getattr_removable_dev'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts made by the caller to read
-## removable devices device nodes.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`storage_dontaudit_read_removable_device',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_dontaudit_read_removable_device'($*)) dnl
-
- gen_require(`
- type removable_device_t;
-
- ')
-
- dontaudit $1 removable_device_t:blk_file read_blk_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_dontaudit_read_removable_device'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts made by the caller to write
-## removable devices device nodes.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`storage_dontaudit_write_removable_device',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_dontaudit_write_removable_device'($*)) dnl
-
- gen_require(`
- type removable_device_t;
- ')
-
- dontaudit $1 removable_device_t:blk_file write_blk_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_dontaudit_write_removable_device'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow the caller to set the attributes of removable
-## devices device nodes.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_setattr_removable_dev',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_setattr_removable_dev'($*)) dnl
-
- gen_require(`
- type removable_device_t;
- ')
-
- dev_list_all_dev_nodes($1)
- allow $1 removable_device_t:blk_file setattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_setattr_removable_dev'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts made by the caller to set
-## the attributes of removable devices device nodes.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`storage_dontaudit_setattr_removable_dev',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_dontaudit_setattr_removable_dev'($*)) dnl
-
- gen_require(`
- type removable_device_t;
- ')
-
- dontaudit $1 removable_device_t:blk_file setattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_dontaudit_setattr_removable_dev'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow the caller to directly read from
-## a removable device.
-## This is extremely dangerous as it can bypass the
-## SELinux protections for filesystem objects, and
-## should only be used by trusted domains.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_raw_read_removable_device',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_raw_read_removable_device'($*)) dnl
-
- gen_require(`
- type removable_device_t;
- ')
-
- dev_list_all_dev_nodes($1)
- allow $1 removable_device_t:blk_file read_blk_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_raw_read_removable_device'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to directly read removable devices.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`storage_dontaudit_raw_read_removable_device',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_dontaudit_raw_read_removable_device'($*)) dnl
-
- gen_require(`
- type removable_device_t;
- ')
-
- dontaudit $1 removable_device_t:blk_file read_blk_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_dontaudit_raw_read_removable_device'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow the caller to directly write to
-## a removable device.
-## This is extremely dangerous as it can bypass the
-## SELinux protections for filesystem objects, and
-## should only be used by trusted domains.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_raw_write_removable_device',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_raw_write_removable_device'($*)) dnl
-
- gen_require(`
- type removable_device_t;
- ')
-
- dev_list_all_dev_nodes($1)
- allow $1 removable_device_t:blk_file write_blk_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_raw_write_removable_device'($*)) dnl
- ')
-
-
-########################################
-##
-## Do not audit attempts to directly write removable devices.
-##
-##
-##
-## Domain to not audit.
-##
-##
-#
- define(`storage_dontaudit_raw_write_removable_device',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_dontaudit_raw_write_removable_device'($*)) dnl
-
- gen_require(`
- type removable_device_t;
- ')
-
- dontaudit $1 removable_device_t:blk_file write_blk_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_dontaudit_raw_write_removable_device'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow the caller to directly read
-## a tape device.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_read_tape',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_read_tape'($*)) dnl
-
- gen_require(`
- type tape_device_t;
- ')
-
- dev_list_all_dev_nodes($1)
- allow $1 tape_device_t:chr_file read_chr_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_read_tape'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow the caller to directly write
-## a tape device.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_write_tape',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_write_tape'($*)) dnl
-
- gen_require(`
- type tape_device_t;
- ')
-
- dev_list_all_dev_nodes($1)
- allow $1 tape_device_t:chr_file write_chr_file_perms;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_write_tape'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow the caller to get the attributes
-## of device nodes of tape devices.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_getattr_tape_dev',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_getattr_tape_dev'($*)) dnl
-
- gen_require(`
- type tape_device_t;
- ')
-
- dev_list_all_dev_nodes($1)
- allow $1 tape_device_t:chr_file getattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_getattr_tape_dev'($*)) dnl
- ')
-
-
-########################################
-##
-## Allow the caller to set the attributes
-## of device nodes of tape devices.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_setattr_tape_dev',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_setattr_tape_dev'($*)) dnl
-
- gen_require(`
- type tape_device_t;
- ')
-
- dev_list_all_dev_nodes($1)
- allow $1 tape_device_t:chr_file setattr;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_setattr_tape_dev'($*)) dnl
- ')
-
-
-########################################
-##
-## Unconfined access to storage devices.
-##
-##
-##
-## Domain allowed access.
-##
-##
-#
- define(`storage_unconfined',` dnl
- pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
- policy_m4_comment(policy_call_depth,begin `storage_unconfined'($*)) dnl
-
- gen_require(`
- attribute storage_unconfined_type;
- ')
-
- typeattribute $1 storage_unconfined_type;
-
- popdef(`policy_call_depth') dnl
- policy_m4_comment(policy_call_depth,end `storage_unconfined'($*)) dnl
- ')
-
-##
-## Basic filesystem types and interfaces.
-##
-##
-##
-## This module contains basic filesystem types and interfaces. This
-## includes:
-##
-## - The concept of different file types including basic
-## files, mount points, tmp files, etc.
-## - Access to groups of files and all files.
-## - Types and interfaces for the basic filesystem layout
-## (/, /etc, /tmp, /usr, etc.).
-##
-##